

{"id":8,"date":"2015-10-08T02:03:10","date_gmt":"2015-10-08T06:03:10","guid":{"rendered":"https:\/\/sites.temple.edu\/cspike\/?page_id=8"},"modified":"2026-05-07T09:44:40","modified_gmt":"2026-05-07T13:44:40","slug":"publications","status":"publish","type":"page","link":"https:\/\/sites.temple.edu\/care\/research-projects\/publications\/","title":{"rendered":"Publications"},"content":{"rendered":"<p><strong>\u00a0[ (*) = undergraduate student co-author; (+) = graduate student co-author ]<\/strong><\/p>\n<p><em>Multidisciplinary and\/or experiential learning papers are marked with a <strong>(#)<\/strong>.<\/em><\/p>\n<p><strong>Forthcoming<\/strong><\/p>\n<p><strong>(#)<\/strong> Rege, A., Park, H.<sup>(+)<\/sup>, Snee, J.<sup>(*)<\/sup> (forthcoming). &#8220;Artificial Intelligence as a Force Multiplier in Social Engineering: An Experiential Learning Approach&#8221;. In <i>The International Conference on Cybersecurity, Situational Awareness and Social Media<\/i><\/p>\n<p><strong>(#)<\/strong> Park, H.<sup>(+)<\/sup>, Spence, G.<sup>(+)<\/sup>, Williams, K., Bleiman, R.<sup>(+)<\/sup> , Snee, J.<sup>(*)<\/sup> &amp; Rege, A. (forthcoming). &#8220;Fostering Civic Engagement in Students Through Community-Driven Cyberhygiene Training for Older Adults&#8221;. Journal of Criminal Justice Education.<\/p>\n<p><strong>(#) <\/strong>Park, H.<sup> (+)<\/sup>, Bleiman, R.<sup>(+)<\/sup>, Snee, J.<sup> (*)<\/sup> &amp; Rege, A. (forthcoming). \u201cExperiential Learning on Pig Butchering Scams in Cybersecurity and Criminal Justice Education\u201d. Proceedings from the <em>16th IEEE Integrated STEM Education Conference (ISEC)<\/em>.<\/p>\n<p><strong>(#) <\/strong>Snee, J.<sup> (*)<\/sup>, Park, H.<sup> (+)<\/sup>, Keo, G. <sup>(*)<\/sup>, Dobisch, J., Pote, S. &amp; Rege, A. (forthcoming). \u201cAttack to Defend: A Pilot Course on Developing Adversarial Thinking, AI-Enhanced Social Engineering, and Penetration Testing\u201d. Proceedings from the <em>16th IEEE Integrated STEM Education Conference (ISEC)<\/em>.<\/p>\n<p><strong>2025<\/strong><\/p>\n<p><strong>(#) <\/strong>Rege, A., Featherson, M.<sup>(*)<\/sup>, Swope, J.<sup>(*)<\/sup>, &amp; Bleiman, R<sup>(+)<\/sup>. (2025). Manipulating Minds with Machines: A Cybersecurity Course Project on AI-Enhanced Social Engineering Attacks. In\u00a0<i>2025 IEEE Integrated STEM Education Conference (ISEC)<\/i> (pp. 1-8). IEEE. DOI:<a href=\"https:\/\/doi.org\/10.1109\/ISEC64801.2025.11147334\" target=\"_blank\" rel=\"noopener\">10.1109\/ISEC64801.2025.11147334<\/a><\/p>\n<p><strong>(#)<\/strong> Park, H.<sup>(+)<\/sup>, Bleiman, R.<sup>(+)<\/sup>, &amp; Rege, A. (2025). Understanding Behavioral and Psychological Aspects of Employment and Tax Scams via a Social Engineering Competition. In <i>2025 IEEE Integrated STEM Education Conference (ISEC)<\/i> (pp. 1-8). IEEE. DOI:<a href=\"https:\/\/doi.org\/10.1109\/ISEC64801.2025.11147395\" target=\"_blank\" rel=\"noopener\">10.1109\/ISEC64801.2025.11147395<\/a><\/p>\n<p><strong>(#)<\/strong> Bleiman, R.<sup>(+)<\/sup>, Park, H.<sup>(+)<\/sup> &amp; Rege, A. (2025). &#8220;Educating students on the behavioral and psychological aspects of romance scam victimization via a social engineering competition&#8221;. Journal of Cybersecurity Education Research and Practice (JCERP): Vol 2025: No 1, Article 3. DOI: <a href=\"https:\/\/digitalcommons.kennesaw.edu\/jcerp\/vol2025\/iss1\/3\/\" target=\"_blank\" rel=\"noopener\">https:\/\/doi.org\/10.62915\/2472-2707.1204<\/a><\/p>\n<p><strong>2024<\/strong><\/p>\n<p><strong>(#)<\/strong> Rege, A., &amp; Bleiman, R<sup>(+)<\/sup>. (2024). A Case Study of a Ransomware and Social Engineering Competition. In <i>The International Conference on Cybersecurity, Situational Awareness and Social Media<\/i> (pp. 149-168). Singapore: Springer Nature Singapore. DOI: <a href=\"https:\/\/doi.org\/10.1007\/978-981-96-0401-2_9\" target=\"_blank\" rel=\"noopener\">https:\/\/doi.org\/10.1007\/978-981-96-0401-2_9<\/a><\/p>\n<p><strong>(#)<\/strong> Rege, A., Spence, G.<sup> (+)<\/sup>, Bleiman, R.<sup>(+)<\/sup>, Mitchell, S. &amp; Latko, J. (2024). Bridging the \u2018town and gown\u2019 divide: Experiential learning for students via a community cyberhygiene training program. In <i>2024 IEEE Integrated STEM Education Conference (ISEC)<\/i> (pp. 1-6). IEEE. DOI:<a href=\"https:\/\/doi.org\/10.1109\/ISEC61299.2024.10664800\" target=\"_blank\" rel=\"noopener\">10.1109\/ISEC61299.2024.10664800<\/a><\/p>\n<p><strong>2023<\/strong><\/p>\n<p><strong>(#)<\/strong> Rege, A., Bleiman, R.<sup>(+)<\/sup>, Williams, K<sup>(+)<\/sup>. (2023). The relevance of social engineering competitions in cybersecurity education. In\u00a0<i>The International Conference on Cybersecurity, Situational Awareness and Social Media<\/i> (pp. 365-381). Singapore: Springer Nature Singapore. DOI: <a href=\"https:\/\/doi.org\/10.1007\/978-981-99-6974-6_20\" target=\"_blank\" rel=\"noopener\">https:\/\/doi.org\/10.1007\/978-981-99-6974-6_20<\/a><\/p>\n<p><strong>(#)<\/strong> Rege, A., Williams, J., Bleiman, R.<sup>(+)<\/sup> &amp; Williams, K.<sup>(+)<\/sup> (2023). Students\u2019 Application of the MITRE ATT&amp;CK Framework Via A Real-Time Cybersecurity Exercise. In\u00a0<i>Proceedings from the 22nd European Conference on Cyber Warfare and Security<\/i>.<\/p>\n<p>Rege, A. &amp; Bleiman, R.<sup>(+)<\/sup>. (2022). \u00a0In\u00a0<i>Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media: Cyber Science 2022; 20\u201321 June; Wales<\/i> (pp. 25-37). Singapore: Springer Nature Singapore. DOI: <a href=\"https:\/\/doi.org\/10.1007\/978-981-19-6414-5_2\" target=\"_blank\" rel=\"noopener\">https:\/\/doi.org\/10.1007\/978-981-19-6414-5_2<\/a><\/p>\n<p><strong>(#)<\/strong> Bleiman, R.<sup> (+)<\/sup>, Williams, J., Rege, A. &amp; Williams, K.<sup>(+)<\/sup>. (2022). In\u00a0<i>Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media: Cyber Science 2022; 20\u201321 June; Wales<\/i> (pp. 133-149). Singapore: Springer Nature Singapore. DOI: <a href=\"https:\/\/doi.org\/10.1007\/978-981-19-6414-5_8\" target=\"_blank\" rel=\"noopener\">https:\/\/doi.org\/10.1007\/978-981-19-6414-5_8<\/a><\/p>\n<p><strong>2022<\/strong><\/p>\n<p>Williams, K.<sup>(+)<\/sup>, Bleiman, R.<sup>(+)<\/sup>, &amp; Rege, A. (2022). Educating educators on social engineering Experiences developing and implementing a social engineering workshop for all education levels. In\u00a0<i>2022 IEEE Integrated STEM Education Conference (ISEC)<\/i> (pp. 188-194). IEEE. DOI:<a href=\"https:\/\/doi.org\/10.1109\/ISEC54952.2022.10025154\" target=\"_blank\" rel=\"noopener\">10.1109\/ISEC54952.2022.10025154<\/a><\/p>\n<p><strong>(#)<\/strong> Rege, A.&amp; Bleiman, R.<sup> (+)<\/sup>. (2022). Collegiate social engineering capture the flag competition. In\u00a0<i>2021 APWG Symposium on Electronic Crime Research (eCrime)<\/i>\u00a0(pp. 1-11). IEEE. <em>Winner of<\/em> <em>Best Student Paper Award. <\/em>DOI:<a href=\"https:\/\/doi.org\/10.1109\/eCrime54498.2021.9738746\" target=\"_blank\" rel=\"noopener\">10.1109\/eCrime54498.2021.9738746<\/a><\/p>\n<p><strong>2021<\/strong><\/p>\n<p>Bleiman, R. <sup>(+)<\/sup>, Ducoste, M.<sup>(+)<\/sup> &amp; Rege, A. (2021). Understanding cybercriminals through analysis of penetration testing group dynamics. In\u00a0<i>2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)<\/i> (pp. 1-8). IEEE. DOI:<a href=\"https:\/\/doi.org\/10.1109\/CyberSA52016.2021.9478252\" target=\"_blank\" rel=\"noopener\">10.1109\/CyberSA52016.2021.9478252<\/a><\/p>\n<p>Ducoste, M. <sup>(+)<\/sup>, Bleiman, R. <sup>(+)<\/sup>, Nguyen, T <sup>(+)<\/sup> &amp; Rege, A. (2021). \u00a0An Examination of Industry Standards of Success within Penetration Testing Groups. In\u00a0<i>2021 IEEE Integrated STEM Education Conference (ISEC)<\/i> (pp. 56-62). IEEE. DOI: <a href=\"https:\/\/doi.org\/10.1109\/ISEC52395.2021.9764146\" target=\"_blank\" rel=\"noopener\">10.1109\/ISEC52395.2021.9764146<\/a><\/p>\n<p><strong>2020<\/strong><\/p>\n<p><strong>(#)<\/strong> Williams, K. (+), Ducoste, M. (+) &amp; Rege, A. (2020). Educating multidisciplinary undergraduates on security and privacy. In\u00a0<i>2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)<\/i> (pp. 1-8). IEEE. DOI: <a href=\"https:\/\/doi.org\/10.1109\/CyberSA49311.2020.9139721\" target=\"_blank\" rel=\"noopener\">10.1109\/CyberSA49311.2020.9139721<\/a><\/p>\n<p>Rege, A. &amp; Bleiman, R. (*). (2020). Ransomware attacks against critical infrastructure. In\u00a0<i>Proc. 20th Eur. Conf. Cyber Warfare Security<\/i>\u00a0(p. 324).<\/p>\n<p><strong>(#)<\/strong> Mendlein, A. (+), Nguyen, T. (+) &amp; Rege, A. (2020). Cybersecurity awareness and training through a multidisciplinary OSINT course project. In <i>2020 ASEE Virtual Annual Conference Content Access<\/i>.<\/p>\n<p>Rege, A., Nguyen, T. (+), &amp; Bleiman, R. (*). (2020). A social engineering awareness and training workshop for STEM students and practitioners. In\u00a0<i>2020 IEEE Integrated STEM Education Conference (ISEC)<\/i> (pp. 1-6). IEEE. DOI:<a href=\"https:\/\/doi.org\/10.1109\/ISEC49744.2020.9280596\" target=\"_blank\" rel=\"noopener\">10.1109\/ISEC49744.2020.9280596<\/a><\/p>\n<p>Rege, A., Yang, S., Mendlein, A. (+), Williams, K. (+), Su, S (+) &amp; Moskal, S. (+). (2020). Dissecting Cyberadversarial Intrusion Stages via Interdisciplinary Observations. In\u00a0<i>Proceedings of the Sixth International Workshop on Security and Privacy Analytics<\/i> (pp. 71-77). DOI: <a href=\"https:\/\/doi.org\/10.1145\/3375708.3380317\" target=\"_blank\" rel=\"noopener\">https:\/\/doi.org\/10.1145\/3375708.3380317<\/a><\/p>\n<p>Bleiman, R. (*) &amp; Rege, A. (2020). \u201cThe susceptibility of humans in disclosing sensitive information\u201d. Proceedings from the 15th International Conference on Cyber Warfare and Security.<\/p>\n<p><strong>2019<\/strong><\/p>\n<p>Ulrich, T., Boring, R., McJunkin, T. &amp; Rege, A. (2019). A visualization approach to performing task analysis of time series event log data from a microworld simulation. In\u00a0<i>Proceedings of the Human Factors and Ergonomics Society Annual Meeting<\/i> (Vol. 63, No. 1, pp. 1867-1871). Sage CA: Los Angeles, CA: SAGE Publications. DOI: <a href=\"https:\/\/doi.org\/10.1177\/1071181319631534\" target=\"_blank\" rel=\"noopener\">https:\/\/doi.org\/10.1177\/1071181319631534<\/a><\/p>\n<p><strong>(#)<\/strong> Rege, A., Mendlein, A. (+) &amp; Williams, K. (+) (2019). Security and privacy education for STEM undergraduates: a shoulder surfing course project. In\u00a0<i>2019 IEEE Frontiers in Education Conference (FIE)<\/i> (pp. 1-7). IEEE. DOI:<a href=\"https:\/\/doi.org\/10.1109\/FIE43999.2019.9028560\" target=\"_blank\" rel=\"noopener\">10.1109\/FIE43999.2019.9028560<\/a><\/p>\n<p>Rege, A. &amp; Adams, J. (2019). The need for more sophisticated cyber-physical systems war gaming exercises. In\u00a0<i>ECCWS 2019 18th European conference on cyber warfare and security<\/i>\u00a0(p. 403). Academic Conferences and publishing limited.<\/p>\n<p>Rege, A., VanZant, S. (2019). Examining the Roles of Muhajirahs in the Islamic State via Twitter. In\u00a0<i>2019 International Conference on Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)<\/i> (pp. 1-8). IEEE.\u00a0<i>Winner of best paper award<\/i>. DOI:<a href=\"https:\/\/doi.org\/10.1109\/CyberSA.2019.8899639\" target=\"_blank\" rel=\"noopener\">10.1109\/CyberSA.2019.8899639<\/a><\/p>\n<p><strong>(#)<\/strong> Rege, A., Williams, K. (+) &amp; Mendlein, A. (+) (2019). A social engineering course project for undergraduate students across multiple disciplines. In\u00a0<i>2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)<\/i> (pp. 1-8). IEEE. DOI:<a href=\"https:\/\/doi.org\/10.1109\/CyberSecPODS.2019.8885085\" target=\"_blank\" rel=\"noopener\">10.1109\/CyberSecPODS.2019.8885085<\/a><\/p>\n<p>Asadi, N. (+), Rege, A., Obradovic, Z. (2019). Pattern discovery in intrusion chains and adversarial movement. In\u00a0<i>2019 International Conference on Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)<\/i> (pp. 1-4). IEEE. DOI:<a href=\"https:\/\/doi.org\/10.1109\/CyberSA.2019.8899391\" target=\"_blank\" rel=\"noopener\">10.1109\/CyberSA.2019.8899391<\/a><\/p>\n<p><strong>(#)<\/strong> Rege, A., Williams, K. (+) &amp; Mendlein, A. (+) (2019). An experiential learning cybersecurity project for multiple STEM undergraduates. In\u00a0<i>2019 IEEE Integrated STEM Education Conference (ISEC)<\/i> (pp. 169-176). IEEE. DOI:<a href=\"https:\/\/doi.org\/10.1109\/ISECon.2019.8882112\" target=\"_blank\" rel=\"noopener\">10.1109\/ISECon.2019.8882112<\/a><\/p>\n<p><strong>2018<\/strong><\/p>\n<p>Asadi, N. (+), Rege, A. &amp; Obradovic, Z. (2018). &#8220;An Assessment of Group Dynamics During Cyber Crime Through Temporal Network Topology&#8221;. Proceedings of the 10th International Conference on Social Computing, Behavioral-Cultural Modeling &amp; Prediction and Behavior Representation in Modeling and Simulation (SBP-BRiMS).<\/p>\n<p>Asadi, N. (+), Rege, A. &amp; Obradovic, Z. (2018). \u201cAnalysis of Adversarial Movement Through Characteristics of Graph Topological Ordering\u201d. Proceedings of the International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA).<\/p>\n<p>Dobson, G., Rege, A. &amp; Carley, K. (2018). Informing Active Cyber Defense with Realistic Adversarial Behavior.\u00a0<span style=\"text-decoration: underline\">Journal of Information Warfare<\/span>.\u00a017(2): 16-31.<\/p>\n<p>Dobson, G., Rege, A. &amp; Carley, K. (2018). Virtual Cyber Warfare Experiments based on Empirically Observed Adversarial Intrusion Chain Behavior.\u00a0Proceedings from the 13th International Conference on Cyber Warfare and Security.<\/p>\n<p>Rege, A., Obradovic, Z., Asadi, N.(+), Parker, E.(+), Pandit, R.(*), Masceri, N.(*), Singer, B.(*) (2018) &#8220;Predicting Adversarial Cyber Intrusion Stages Using Autoregressive Neural Networks,&#8221; <span style=\"text-decoration: underline\">IEEE Intelligent Systems<\/span> PP(99):1-1.\u00a0<em>Impact Factor 2.374.<\/em><\/p>\n<p><strong>2017<\/strong><\/p>\n<p>Yang, S. J., Rege, A. &amp; Kuhl, M. E. (2017). &#8220;<a href=\"http:\/\/ceur-ws.org\/Vol-2057\/Paper6.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Learning, Simulating and Predicting Adversary Attack Behaviors for Proactive Cyber Defense<\/a>&#8220;, in Proceedings of <a href=\"http:\/\/ceur-ws.org\/Vol-2057\/\" target=\"_blank\" rel=\"noopener noreferrer\">NATO IST-152 Workshop on Intelligent Autonomous Agents for Cyber Defence and Resilience<\/a>, pp. 30-34, October 18-20, 2017, Prague, Czech Republic.<\/p>\n<p><strong>(#)<\/strong> Rege, A., Biswas, S., Bai, L., Parker, E. (+) &amp; McJunkin, T. (2017). \u201cUsing Simulators to Assess Knowledge and Behavior of \u201cNovice\u201d Operators of Critical Infrastructure under Cyberattack Events\u201d. In Resilience Week (RWS), 2017 (pp. 50-56). IEEE.<\/p>\n<p><strong>(#)<\/strong> Rege, A., Parker, E. (+) &amp; McJunkin, T. (2017). \u201cUsing a Critical Infrastructure Game to Provide Realistic Observation of the Human in the Loop by Criminal Justice Students\u201d. In Resilience Week (RWS), 2017 (pp. 154-160). IEEE.<\/p>\n<p>Rege, A., Adams, J., Parker, E. (+), Singer, B. (*), Masceri, N. (*) &amp; Pandit, R. (*) (2017). &#8220;Using Cyber-security Exercises to Study Adversarial Intrusion Chains, Decision-Making, and Group Dynamics&#8221;. In ECCWS 2017 16th European Conference on Cyber Warfare and Security (p. 351). Academic Conferences and publishing limited.<\/p>\n<p>Rege, A., Obradovic, Z., Asadi, N.(+), Singer, B.(*), Masceri, N.(*), Heath, Q.(*). (2017). &#8220;A Temporal Assessment of Cyber Intrusion Chains Using Multidisciplinary Frameworks and Methodologies,&#8221; Proc. Int\u2019l Conf. Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA 2017), London, UK, June 2017.<\/p>\n<p>Rege, A., Obradovic, Z., Asadi, N.(+), Parker, E.(+), Masceri, N.(*), Singer, B(*), Pandit, R(*). (2017). &#8220;Using a Real-Time Cybersecurity Exercise Case Study to Understand Temporal Characteristics of Cyberattacks,&#8221; Proc. 2017 Int\u2019l Conf. Social Computing, Behavioral-Cultural Modeling &amp; Prediction and Behavior representation in Modeling and Simulation (SBP-BRiMS), Washington DC, July 2017.<\/p>\n<p>Rege, A., Parker, E. (+), Singer, B.(*) &amp; Masceri, N(*). (2017). A Qualitative Exploration of Adversarial Adaptability, Group Dynamics, and Cyber Intrusion Chains. Journal of Information Warfare. 16(3): 1-16.<\/p>\n<p>Rege, A., Singer, B. (*), Masceri, N. (*) &amp; Heath, Q. (*) (2017). Measuring Cyber Intrusion Chains, Adaptive Adversarial Behavior, and Group Dynamics. Proceedings of the 12th International Conference on Cyber Warfare and Security.<\/p>\n<p><strong>2016<\/strong><\/p>\n<p>Rege, A. (2016). Incorporating the Human Element in Anticipatory and Dynamic Cyber Defense. Proceedings of the 4th International Conference on Cybercrime and Computer Forensics (ICCCF). Institute of Electrical and Electronics Engineers (IEEE).<\/p>\n<p><strong>(#)<\/strong> McJunkin, T., Rieger, C., Rege, A., Biswas, S., Haney, M., Santora, M., Johnson, B., Boring, R., Naidu, D.S. &amp; Gardner, J. (2016). Multidisciplinary Game Based Approach for Generating Student Enthusiasm in Addressing Critical Infrastructure Challenges. Proceedings of the 123rd American Society for Engineering Education (ASEE).<\/p>\n<p><strong>2015<\/strong><\/p>\n<p><strong>(#)<\/strong> Rege, A. (2015). Multidisciplinary Experiential Learning for Holistic Cybersecurity Education, Research and Evaluation. Proceedings of the 2015 USENIX Summit on Gaming, Games, and Gamification in Security Education.<\/p>\n<p><strong>2014<\/strong><\/p>\n<p>Rege, A., Ferrese, F., Biswas, S., &amp; Bai, L. (2014). Adversary dynamics and smart grid security: A multiagent system approach. Proceedings of the 7th International Symposium on Resilient Control Systems (ISRCS). Institute of Electrical and Electronics Engineers (IEEE). pp. 1-7. IEEE Catalog Number: CFP1469H-ART [ISBN: 978-1-4799-4187-2] DOI: 10.1109\/ISRCS.2014.6900101.<\/p>\n<p>Rege, A. (2014). A Criminological Perspective on Power Grid Cyberattacks: Using Routine Activities Theory and Rational Choice Perspective to Explore Adversarial Decision-Making. <span style=\"text-decoration: underline\">Journal of Homeland Security and Emergency Management (JHSEM)<\/span>. 11(4): 463-487. Impact Factor 0.566<\/p>\n<p>Rege, A. (2014). Digital Information Warfare Trends in Eurasia. <span style=\"text-decoration: underline\">Security Journal<\/span>, 27(2): 374-398. Impact factor 0.341<\/p>\n<p><!-- Start of StatCounter Code for Default Guide --><br \/>\n<span style=\"color: white\"><br \/>\nvar sc_project=11402105;<br \/>\nvar sc_invisible=0;<br \/>\nvar sc_security=&#8221;d290c09e&#8221;;<br \/>\nvar scJsHost = ((&#8220;https:&#8221; == document.location.protocol) ?<br \/>\n&#8220;https:\/\/secure.&#8221; : &#8220;http:\/\/www.&#8221;);<br \/>\ndocument.write(&#8220;&#8221;);<br \/>\n<\/span><\/p>\n<div class=\"statcounter\"><\/div>\n<p><!-- End of StatCounter Code for Default Guide --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00a0[ (*) = undergraduate student co-author; (+) = graduate student co-author ] Multidisciplinary and\/or experiential learning papers are marked with a (#). Forthcoming (#) Rege,&#8230;<\/p>\n<div class=\"more-link-wrapper\"><a class=\"more-link\" href=\"https:\/\/sites.temple.edu\/care\/research-projects\/publications\/\">Continue reading<span class=\"screen-reader-text\">Publications<\/span><\/a><\/div>\n","protected":false},"author":2224,"featured_media":0,"parent":151,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"templates\/full-width.php","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-8","page","type-page","status-publish","hentry","entry"],"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/sites.temple.edu\/care\/wp-json\/wp\/v2\/pages\/8","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sites.temple.edu\/care\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.temple.edu\/care\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.temple.edu\/care\/wp-json\/wp\/v2\/users\/2224"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.temple.edu\/care\/wp-json\/wp\/v2\/comments?post=8"}],"version-history":[{"count":18,"href":"https:\/\/sites.temple.edu\/care\/wp-json\/wp\/v2\/pages\/8\/revisions"}],"predecessor-version":[{"id":4195,"href":"https:\/\/sites.temple.edu\/care\/wp-json\/wp\/v2\/pages\/8\/revisions\/4195"}],"up":[{"embeddable":true,"href":"https:\/\/sites.temple.edu\/care\/wp-json\/wp\/v2\/pages\/151"}],"wp:attachment":[{"href":"https:\/\/sites.temple.edu\/care\/wp-json\/wp\/v2\/media?parent=8"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}