https://law.temple.edu/contact/bonny-l-tavares/
Professor Tavares joined the Temple University Beasley School of Law faculty in 2004. She teaches legal research and writing and legal drafting, serves on the Faculty Selection Committee, and chairs the Disciplinary Committee. From 2000 to 2003, Professor Tavares taught legal research and writing at Howard University School of Law. She received her J.D. in 1993 from Howard University School of ...
https://liberalarts.temple.edu/directory/jack-liang
He received his PhD from Yale University in 2025, and received a BS in Mathematics from the University of Chicago in 2017. Jack's research interests include trade and spatial economics, with a focus on firm growth and market power.
https://cph.temple.edu/sites/cph/files/node/profile/resume/Anne%20Frankel%20CV%20July%202020-1.pdf
2016-2017 2016-2017 2016-2017 2016-2017 2015-2016 2015-2016 2015-2016 Marcelle Chevriere-DiBiasi, MPH, Exploring provider perspectives: A strategy to increase access to cervical cancer control. Ariel Ressler MacNeill, MPH, Holistic mental health interventions for refugee survivors of torture: Evaluation of Philadelphia Partnership for Resilience.
https://law.temple.edu/contact/jules-epstein/
Jules Epstein is a Professor of Law and Director of Advocacy Programs and Clinical Legal Education at Temple University Beasley School of Law.
https://disabilities.temple.edu/sites/disabilities/files/media/document/Trauma-Informed-Research-Guide-PCORI-2025.pdf
A How-To Guide for Qualitative Research with Survivors with IDD Accessible Trauma-Informed Research:
https://community.mis.temple.edu/mis5206sec701fall2024/files/2020/08/SANS-Reading7_application-development-technology-tools-vulnerabilities-threat-management-secure-programming-practices-defense-in-depth-approach-1283.pdf
This paper addresses the security challenges that exist due to programming flaws, and explains how simple programming practices can reduce the risks. The paper starts with a description of common application vulnerabilities and risks. The vulnerabilities that are discussed include Buffer overflows, SQL Injection, Script Injection, XML injection and others. The application development platforms ...
https://law.temple.edu/wp-content/uploads/Nguyen-CV.pdf
University of California, Berkeley, School of Law Visiting Scholar, Center for the Study of Law and Society, 2017–2019
https://phlr.temple.edu/
Law is a powerful tool that can advance health and well-being. By developing and promoting the measurement and evaluation of the law’s impact, through the field of legal epidemiology, we strive to support evidence-based, proactive, and creative policies that advance public health and well-being for all.
https://education.temple.edu/directory/avi-kaplan-akaplan
Biography Dr. Avi Kaplan’s research interests focus on people's motivation and identity development, with particular interest in the role of the environment in these processes. His recent research involves the application of the complex dynamic systems approach to identity and motivation, and employing collaborative design-based interventions that focus on diverse people's motivation ...
https://guides.temple.edu/c.php?g=646455&p=9816775
How to identify (and avoid) false information.