Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Artificial intelligence (6)
- Cybersecurity (5)
- AI (4)
- AI in education (4)
- Online learning (4)
-
- Higher education (3)
- Machine learning (3)
- Academia (2)
- Animation (2)
- Big data (2)
- ChatGPT (2)
- Collaboration (2)
- Education (2)
- Educational technology (2)
- Higher education institutions (2)
- Instructional design (2)
- Literature reviews (2)
- Networking (2)
- Non-degree training (2)
- Parallel computing (2)
- Perceptions (2)
- Social sciences (2)
- Students (2)
- Systematic review (2)
- Technology (2)
- 3D interactive simulation (1)
- ADHD (1)
- AI literacy (1)
- AI-assisted writing (1)
- AIEd (1)
- Publication Year
- Publication
-
- STEMPS Faculty Publications (10)
- Computer Science Faculty Publications (6)
- Cybersecurity Undergraduate Research Showcase (5)
- Teaching & Learning Faculty Publications (5)
- Electrical & Computer Engineering Faculty Publications (4)
-
- Information Technology & Decision Sciences Faculty Publications (3)
- VMASC Publications (3)
- Communication Disorders & Special Education Faculty Publications (2)
- Computational Modeling & Simulation Engineering Theses & Dissertations (2)
- Engineering Technology Faculty Publications (2)
- University Administration Publications (2)
- Civil & Environmental Engineering Faculty Publications (1)
- Computational Modeling & Simulation Engineering Faculty Publications (1)
- Computer & Information Science: Research Experiences for Undergraduates in Disinformation Detection and Analytics (1)
- Computer Science Presentations (1)
- Computer Science Theses & Dissertations (1)
- Distance Learning Faculty & Staff Books (1)
- Distance Learning Faculty & Staff Publications (1)
- Educational Leadership & Workforce Development Faculty Publications (1)
- Educational Leadership & Workforce Development Theses & Dissertations (1)
- Electrical & Computer Engineering Theses & Dissertations (1)
- Engineering Management & Systems Engineering Theses & Dissertations (1)
- Modeling, Simulation and Visualization Student Capstone Conference (1)
- STEMPS Theses & Dissertations (1)
- Sociology & Criminal Justice Faculty Publications (1)
- Undergraduate Research Symposium (1)
- Publication Type
Articles 1 - 30 of 59
Full-Text Articles in Education
What Students Have To Say On Data Privacy For Educational Technology, Stephanie Choi
What Students Have To Say On Data Privacy For Educational Technology, Stephanie Choi
Cybersecurity Undergraduate Research Showcase
The literature on data privacy in terms of educational technology is a growing area of study. The perspective of educators has been captured extensively. However, the literature on students’ perspectives is missing, which is what we explore in this paper. We use a pragmatic qualitative approach with an experiential lens to capture students’ attitudes towards data privacy in terms of educational technology. We identified preliminary, common themes that appeared in the survey responses. The paper concludes by calling for more research on how students perceive data privacy in terms of educational technology.
The Security Of Deep Neural Networks, Jalaya Allen
The Security Of Deep Neural Networks, Jalaya Allen
Cybersecurity Undergraduate Research Showcase
Our society has transitioned from our primitive lifestyle to soon, an increasingly automatic one. That idea is further exemplified as we shift into an AI era, better known as Artificial intelligence. Artificial Intelligence is classified as computer systems that can perform tasks that typically require human intelligence. However, a common thought or question that most might have is, how is this done? How does AI process information the way we want it to and have access to so much information? AI is trained by systems called AI models. These modeling programs are trained on data to recognize patterns or make …
Improving Educational Delivery And Content In Juvenile Detention Centers, Yomna Elmousalami
Improving Educational Delivery And Content In Juvenile Detention Centers, Yomna Elmousalami
Undergraduate Research Symposium
Students in juvenile detention centers have the greatest need to receive improvements in educational delivery and content; however, they are one of the “truly disadvantaged” populations in terms of receiving those improvements. This work presents a qualitative data analysis based on a focus group meeting with stakeholders at a local Juvenile Detention Center. The current educational system in juvenile detention centers is based on paper worksheets, single-room style teaching methods, outdated technology, and a shortage of textbooks and teachers. In addition, detained students typically have behavioral challenges that are deemed "undesired" in society. As a result, many students miss classes …
Automatic Classification Of Activities In Classroom Videos, Jonathan K. Foster, Matthew Korban, Peter Youngs, Ginger S. Watson, Scott T. Acton
Automatic Classification Of Activities In Classroom Videos, Jonathan K. Foster, Matthew Korban, Peter Youngs, Ginger S. Watson, Scott T. Acton
VMASC Publications
Classroom videos are a common source of data for educational researchers studying classroom interactions as well as a resource for teacher education and professional development. Over the last several decades emerging technologies have been applied to classroom videos to record, transcribe, and analyze classroom interactions. With the rise of machine learning, we report on the development and validation of neural networks to classify instructional activities using video signals, without analyzing speech or audio features, from a large corpus of nearly 250 h of classroom videos from elementary mathematics and English language arts instruction. Results indicated that the neural networks performed …
Types Of Teacher-Ai Collaboration In K-12 Classroom Instruction: Chinese Teachers' Perspective, Jinhee Kim
Types Of Teacher-Ai Collaboration In K-12 Classroom Instruction: Chinese Teachers' Perspective, Jinhee Kim
STEMPS Faculty Publications
The advancing power and capabilities of artificial intelligence (AI) have expanded the roles of AI in education and have created the possibility for teachers to collaborate with AI in classroom instruction. However, the potential types of teacher-AI collaboration (TAC) in classroom instruction and the benefits and challenges of implementing TAC are still elusive. This study, therefore, aimed to explore different types of TAC and the potential benefits and obstacles of TAC through Focus Group Interviews with 30 Chinese teachers. The study found that teachers anticipated six types of TAC, which are thematized as One Teach, One Observe; One Teach, One …
Enhancing Decision-Making In Higher Education: Exploring The Integration Of Chatgpt And Data Visualization Tools In Data Analysis, Tristan Jiang, Elina Liu, Tasawar Baig, Qingrong Li
Enhancing Decision-Making In Higher Education: Exploring The Integration Of Chatgpt And Data Visualization Tools In Data Analysis, Tristan Jiang, Elina Liu, Tasawar Baig, Qingrong Li
University Administration Publications
This chapter explores the potential of integrating conversational AI tools such as ChatGPT with data visualization (DV) tools such as Power BI in higher education settings. A brief history of chatbots is summarized and challenges and opportunities in higher education are outlined. The highlights include AI's prospects for enhancing data-informed decision-making while needing safeguards to mitigate risks. Through a pioneering exercise, we integrated ChatGPT's conversational capabilities with Power BI's interface via API and tested functionality. Suggestions for good practice and implications for higher education are discussed.
Deapsecure Computational Training For Cybersecurity: Progress Toward Widespread Community Adoption, Wirawan Purwanto, Bahador Dodge, Karina Arcaute, Masha Sosonkina, Hongyi Wu
Deapsecure Computational Training For Cybersecurity: Progress Toward Widespread Community Adoption, Wirawan Purwanto, Bahador Dodge, Karina Arcaute, Masha Sosonkina, Hongyi Wu
Electrical & Computer Engineering Faculty Publications
The Data-Enabled Advanced Computational Training Program for Cybersecurity Research and Education (DeapSECURE) is a non-degree training consisting of six modules covering a broad range of cyberinfrastructure techniques, including high performance computing, big data, machine learning and advanced cryptography, aimed at reducing the gap between current cybersecurity curricula and requirements needed for advanced research and industrial projects. Since 2020, these lesson modules have been updated and retooled to suit fully-online delivery. Hands-on activities were reformatted to accommodate self-paced learning. In this paper, we summarize the four years of the project comparing in-person and on-line only instruction methods as well as outlining …
Different Visions From Biosview: A Brief Report, Lucas N. Potter, Xavier-Lewis Palmer
Different Visions From Biosview: A Brief Report, Lucas N. Potter, Xavier-Lewis Palmer
Electrical & Computer Engineering Faculty Publications
In this collaborative research endeavor at the intersection of biological safety and cybersecurity for BiosView labs, the authors highlight their engagement with a diverse student cohort. The chapter delves into the motivation behind collaborations extending beyond traditional academic research environments, emphasizing inclusivity. The meticulous examination of student demographics, including gender, self-reported ethnicity, and national origin, is detailed in the methodology. A student-centric approach is central to the exploration, focusing on aligning teaching and management styles with unique student needs. The chapter elaborates on effective teaching methodologies and management practices tailored for BiosView labs. A dedicated section emphasizes the purpose of …
Higher Education Faculty Perceptions Of Chatgpt And The Influencing Factors: A Sentiment Analysis Of X, Yoseph Mamo, Helen Crompton, Diane Burke, Christine E. Nickel
Higher Education Faculty Perceptions Of Chatgpt And The Influencing Factors: A Sentiment Analysis Of X, Yoseph Mamo, Helen Crompton, Diane Burke, Christine E. Nickel
STEMPS Faculty Publications
ChatGPT, an AI chatbot developed by OpenAI, was released in November 2022, sparking a significant surge in global awareness and utilization of generative AI across various domains. Although recent studies have acknowledged the significance of ChatGPT in the education sector, they have yet to focus on exploring faculty attitudes toward ChatGPT. We gathered a comprehensive corpus of tweets containing “#ChatGPT” and “#highered” between November 30th, 2022, and April 30th, 2023. We analyzed data by triangulating VADER, NRC lexicon, and ground coding. Findings suggest that 40% of the expressed sentiments were positive, 51% were neutral, and 9% were negative. The study …
Differences In Student-Ai Interaction Process On A Drawing Task: Focusing On Students' Attitude Towards Ai And The Level Of Drawing Skills, Jinhee Kim, Yoonhee Ham, Sang-Soog Lee
Differences In Student-Ai Interaction Process On A Drawing Task: Focusing On Students' Attitude Towards Ai And The Level Of Drawing Skills, Jinhee Kim, Yoonhee Ham, Sang-Soog Lee
STEMPS Faculty Publications
Recent advances and applications of artificial intelligence (AI) have increased the opportunities for students to interact with AI in their learning tasks. Although various fields of scholarly research have investigated human-AI collaboration, the underlying processes of how students collaborate with AI in a student-AI teaming scenario have been scarcely investigated. To develop effective AI applications in education, it is necessary to understand differences in the student-AI interaction (SAI) process depending on students' characteristics. The present study attempts to fill this gap by exploring the differences in the SAI process amongst students with varying drawing proficiencies and attitudes towards AI in …
Exploring Students' Perspectives On Generative Ai-Assisted Academic Writing, Jinhee Kim, Seongryeong Yu, Rita Detrick, Na Li
Exploring Students' Perspectives On Generative Ai-Assisted Academic Writing, Jinhee Kim, Seongryeong Yu, Rita Detrick, Na Li
STEMPS Faculty Publications
The rapid development of generative artificial intelligence (GenAI), including large language models (LLM), has merged to support students in their academic writing process. Keeping pace with the technical and educational landscape requires careful consideration of the opportunities and challenges that GenAI-assisted systems create within education. This serves as a useful and necessary starting point for fully leveraging its potential for learning and teaching. Hence, it is crucial to gather insights from diverse perspectives and use cases from actual users, particularly the unique voices and needs of student-users. Therefore, this study explored and examined students' perceptions and experiences about GenAI-assisted academic …
The Educational Affordances And Challenges Of Chatgpt: State Of The Field, Helen Crompton, Diane Burke
The Educational Affordances And Challenges Of Chatgpt: State Of The Field, Helen Crompton, Diane Burke
STEMPS Faculty Publications
ChatGPT was released to the public in November 30, 2022. This study examines how ChatGPT can be used by educators and students to promote learning and what are the challenges and limitations. This study is unique in providing one of the first systematic reviews using peer review studies to provide an early examination of the field. Using PRISMA principles, 44 articles were selected for review. Grounded coding was then used to reveal trends in the data. The findings show that educators can use ChatGPT for teaching support, task automation, and professional development. These were further delineated further by axial sub …
Developing A Framework For Personalized Video-Based Quantum Information Science Education, Nikos Chrisochoides, Norou Diawara, Michail Giannakos
Developing A Framework For Personalized Video-Based Quantum Information Science Education, Nikos Chrisochoides, Norou Diawara, Michail Giannakos
Computer Science Faculty Publications
This is a white paper on Workforce Development for Quantum Information Sciences (QIS) led by the Center for Real-Time Computing at Old Dominion University (ODU). We plan to investigate the potential of video lectures in supporting QIS. Specifically, we focus on following four objectives: (a) design a two-course series for both Master-level and PhD students; b) an upgrade of Experimental Lecture System (ELeSy) to test new, innovative, and transformative approaches for inclusive QIS education; c) design and implementation of a mixed-method systematic empirical study on the effects of video learning styles (in-person flipped classroom and voluntary video use) on graduate …
How Chatgpt Can Be Used As A Defense Mechanism For Cyber Attacks, Michelle Ayaim
How Chatgpt Can Be Used As A Defense Mechanism For Cyber Attacks, Michelle Ayaim
Cybersecurity Undergraduate Research Showcase
The powers of OpenAI's groundbreaking AI language model, ChatGPT, startled millions of users when it was released in November. But for many, the tool's ability to further accomplish the goals of evil actors swiftly replaced their initial excitement with significant concerns. ChatGPT gives malicious actors additional ways to possibly compromise sophisticated cybersecurity software. Leaders in a sector that is currently suffering from a 38% global spike in data breaches in 2022 must acknowledge the rising influence of AI and take appropriate action. Cybercriminals are writing more complex and focused business email compromise (BEC) and other phishing emails with the assistance …
The Underrepresentation Of Black Females In Cybersecurity, Makendra Latrice Crosby
The Underrepresentation Of Black Females In Cybersecurity, Makendra Latrice Crosby
Cybersecurity Undergraduate Research Showcase
The significance of cybersecurity methods, strategies, and programs in protecting computers and electronic devices is crucial throughout the technological infrastructure. Despite the considerable growth in the cybersecurity field and its expansive workforce, there exists a notable underrepresentation, specifically among Black/African American females. This study examines the barriers hindering the inclusion of Black women in the cybersecurity workforce such as socioeconomic factors, limited educational access, biases, and workplace culture. The urgency of addressing these challenges calls for solutions such as education programs, mentorship initiatives, creating inclusive workplace environments, and promoting advocacy and increased awareness within the cybersecurity field. Additionally, this paper …
Digital Game-Based Approach To Math Learning For Students, Gul Ayaz, Katherine Smith
Digital Game-Based Approach To Math Learning For Students, Gul Ayaz, Katherine Smith
Modeling, Simulation and Visualization Student Capstone Conference
Mathematics is an important subject that is pervasive across many disciplines. It is also a subject that has proven to be challenging to both teach and learn. Students face many challenges with learning math such as a lack of motivation and anxiety. To address these challenges, game-based learning has become a popular approach to stimulate students and create a more positive classroom environment. It can serve as an alternative or supplement to traditional teaching and can better engage students while developing a positive attitude toward learning. The use of games in a classroom can create a more exciting and engaging …
Artificial Intelligence In Higher Education: The State Of The Field, Helen Crompton, Diane Burke
Artificial Intelligence In Higher Education: The State Of The Field, Helen Crompton, Diane Burke
Teaching & Learning Faculty Publications
This systematic review provides unique findings with an up-to-date examination of artificial intelligence (AI) in higher education (HE) from 2016 to 2022. Using PRISMA principles and protocol, 138 articles were identified for a full examination. Using a priori, and grounded coding, the data from the 138 articles were extracted, analyzed, and coded. The findings of this study show that in 2021 and 2022, publications rose nearly two to three times the number of previous years. With this rapid rise in the number of AIEd HE publications, new trends have emerged. The findings show that research was conducted in six of …
Integration Of Omnet++ Into A Networking Course In An Electrical Engineering Technology Program, Murat Kuzlu, Brian Emmanuel Tamayo, Salih Sarp, Otilia Popescu, Vukica M. Jovanovic
Integration Of Omnet++ Into A Networking Course In An Electrical Engineering Technology Program, Murat Kuzlu, Brian Emmanuel Tamayo, Salih Sarp, Otilia Popescu, Vukica M. Jovanovic
Engineering Technology Faculty Publications
Networking courses are an integral part of electrical engineering technology programs as the majority of electronics in the modern day are required to communicate with each other. They are also getting more attention in manufacturing engineering technology programs because of the development of emerging technologies in Industry 4.0 arena. From laptops, computers, cellphones, modern day vehicles and smart refrigerators, these devices require a certain level of networking in order to communicate with other devices, whether it be locally, or even across the other side of the world. The objective of networking courses in an electrical engineering program is to demonstrate …
Ict Security Tools And Techniques Among Higher Education Institutions: A Critical Review, Miko Nuñez, Xavier-Lewis Palmer, Lucas Potter, Chris Jordan Aliac, Lemuel Clark Velasco
Ict Security Tools And Techniques Among Higher Education Institutions: A Critical Review, Miko Nuñez, Xavier-Lewis Palmer, Lucas Potter, Chris Jordan Aliac, Lemuel Clark Velasco
Electrical & Computer Engineering Faculty Publications
Higher education institutions (HEIs) are increasingly relying on digital technologies for classroom and organizational management, but this puts them at higher risk for information and communication (ICT security attacks. Recent studies show that HEIs have experienced more security breaches in ICT security composed of both cybersecurity an information security. A literature review was conducted to identify common ICT security practices in HEIs over the last decade. 11 journal articles were profiled and analyzed, revealing threats to HEIs’ security and protective measures in terms of organizational security, technological security, physical security, and standards and frameworks. Security tools and techniques were grouped …
Speculative Futures On Chatgpt And Generative Artificial Intelligence (Ai): A Collective Reflection From The Educational Landscape, Aras Bozkurt, Junhong Xiao, Sarah Lambert, Angelica Pazurek, Helen Crompton, Suzan Koseoglu, Robert Farrow, Melissa Bond, Chrissi Nerantzi, Sarah Honeychurch, Maha Bali, Jon Dron, Kamran Mir, Bonnie Stewart, Eamon Costello, Jon Mason, Christian M. Stracke, Enilda Romero-Hall, Apostolos Koutropoulos, Cathy Mae Toquero, Lenandlar Singh, Ahmed Tlili, Kyungmee Lee, Mark Nichols, Ebba Ossiannilsson, Mark Brown, Valerie Irvine, Juliana Elisa Raffaghelli, Gema Santos-Hermosa, Orna Farrell, Taskeen Adam, Ying Li Thong, Sunagul Sani-Bozkurt, Ramesh C. Sharma, Stefan Hrastinski, Petar Jandrić
Speculative Futures On Chatgpt And Generative Artificial Intelligence (Ai): A Collective Reflection From The Educational Landscape, Aras Bozkurt, Junhong Xiao, Sarah Lambert, Angelica Pazurek, Helen Crompton, Suzan Koseoglu, Robert Farrow, Melissa Bond, Chrissi Nerantzi, Sarah Honeychurch, Maha Bali, Jon Dron, Kamran Mir, Bonnie Stewart, Eamon Costello, Jon Mason, Christian M. Stracke, Enilda Romero-Hall, Apostolos Koutropoulos, Cathy Mae Toquero, Lenandlar Singh, Ahmed Tlili, Kyungmee Lee, Mark Nichols, Ebba Ossiannilsson, Mark Brown, Valerie Irvine, Juliana Elisa Raffaghelli, Gema Santos-Hermosa, Orna Farrell, Taskeen Adam, Ying Li Thong, Sunagul Sani-Bozkurt, Ramesh C. Sharma, Stefan Hrastinski, Petar Jandrić
Teaching & Learning Faculty Publications
While ChatGPT has recently become very popular, AI has a long history and philosophy. This paper intends to explore the promises and pitfalls of the Generative Pre-trained Transformer (GPT) AI and potentially future technologies by adopting a speculative methodology. Speculative future narratives with a specific focus on educational contexts are provided in an attempt to identify emerging themes and discuss their implications for education in the 21st century. Affordances of (using) AI in Education (AIEd) and possible adverse effects are identified and discussed which emerge from the narratives. It is argued that now is the best of times to define …
The Message Design Of Raiders Of The Lost Ark On The Atari 2600 & A Fan’S Map, Quick Start, And Strategy Guide, Miguel Ramlatchan, William I. Ramlatchan
The Message Design Of Raiders Of The Lost Ark On The Atari 2600 & A Fan’S Map, Quick Start, And Strategy Guide, Miguel Ramlatchan, William I. Ramlatchan
Distance Learning Faculty & Staff Books
The message design and human performance technology in video games, especially early video games have always been fascinating to me. From an instructional design perspective, the capabilities of the technology of the classic game consoles required a careful balance of achievable objectives, cognitive task analysis, guided problem solving, and message design. Raiders on the Atari is an excellent example of this balance. It is an epic adventure game, spanning 13+ distinct areas, with an inventory of items, where those hard to find items had to be used by the player to solve problems during their quest (and who would have …
A Technological Skills Gap: What Can We Do About It?, Will Moore
A Technological Skills Gap: What Can We Do About It?, Will Moore
Cybersecurity Undergraduate Research Showcase
In the last thirty years, education has transformed faster than ever before. As a society we have developed new classroom technologies that allow for better communication and access to more information than ever before. However, at the same time, education seems rockier than ever before. Several major companies, including Tesla, Apple, Google and Netflix, no longer require a college degree for employment, and many companies, such as Amazon, Google, and Microsoft, have begun programs to train their own employees in skills and create their own certification programs to help employees learn necessary skills (Akhtar, O’Donnell). Why do these major corporations …
Protecting Blind Screen-Reader Users From Deceptive Content, Ash Dobrenen, Vikas Ashok (Mentor)
Protecting Blind Screen-Reader Users From Deceptive Content, Ash Dobrenen, Vikas Ashok (Mentor)
Computer & Information Science: Research Experiences for Undergraduates in Disinformation Detection and Analytics
Visually impaired people who want to use a computer rely on screen readers to independently do this. This research focuses on beginning to build a chrome extension in order to help users more safely navigate the internet using a screen reader. to begin collecting the data, a screen reader was used to help determine items in the website that might take the user somewhere they did not mean to go since the link or image was not sufficiently able to be described by the screen reader. Next, those items were tagged with ’data-attribute=”deceptive”’. After, those data-attributes were extracted and tagged …
Attitudes About Cybersecurity Articulation Agreements And Transfer Students: A Statewide Survey Of Faculty Members And Advisors, Brian K. Payne, Tracy Vandecar-Burdin, Daniela Cigularova
Attitudes About Cybersecurity Articulation Agreements And Transfer Students: A Statewide Survey Of Faculty Members And Advisors, Brian K. Payne, Tracy Vandecar-Burdin, Daniela Cigularova
Sociology & Criminal Justice Faculty Publications
In this study, cybersecurity faculty and academic advisors from community colleges and 4-year universities in the southeast region of the United States completed a survey assessing attitudes about and support for articulation agreements and related transfer policies. Hypothesizing that professional structures shape attitudes and experiences, the researchers conducted an exploratory quantitative study with primarily descriptive analyses. The results reveal differences in attitudes between community college and 4-year stakeholders and between faculty and academic advisors. The results of this study are discussed in relation to faculty and advisor training and communication.
A Look Into Increasing The Number Of Veterans And Former Government Employees Converting To Career And Technical Cybersecurity Teachers, Vukica M. Jovanovic, Michael Anthony Crespo, Drew E. Brown, Deborah Marshall, Otilia Popescu, Murat Kuzlu, Petros J. Katsioloudis, Linda Vahala
A Look Into Increasing The Number Of Veterans And Former Government Employees Converting To Career And Technical Cybersecurity Teachers, Vukica M. Jovanovic, Michael Anthony Crespo, Drew E. Brown, Deborah Marshall, Otilia Popescu, Murat Kuzlu, Petros J. Katsioloudis, Linda Vahala
Engineering Technology Faculty Publications
The current state of technology with recent explosions in the digital processing of paperwork, computer networking use, and online and virtual approaches to areas, which until very recently had traditional and non-computerized ways of operating, led to a steady increase in the demand for jobs in the area of computer science and cybersecurity. The education system, the pipeline for the incoming workforce, needs to keep up with this tremendous pace in technology and the job market. The current K-12 school system has been extensively challenged to fill out necessary positions in order to address the increasing need for programs that …
Investigating Pre-Service Teachers’ Perceptions Of The Virginia Computer Science Standards Of Learning: A Qualitative Multiple Case Study, Valerie Sledd Taylor
Investigating Pre-Service Teachers’ Perceptions Of The Virginia Computer Science Standards Of Learning: A Qualitative Multiple Case Study, Valerie Sledd Taylor
Educational Leadership & Workforce Development Theses & Dissertations
Computer science education is being recognized globally as necessary to better prepare students in all grade levels, K-12, for future success. As a result of this focus on computer science education in the United States and around the world, there is an increased demand for highly qualified teachers with content and pedagogical knowledge to successfully support student learning. As a result, there is a call to include and improve the computer science training offered to pre-service teachers in their educator preparation programs from methods courses to practicum and student teaching experiences. Thus, it is important to understand how pre-service teachers …
Deapsecure Computational Training For Cybersecurity Students: Improvements, Mid-Stage Evaluation, And Lessons Learned, Wirawan Purwanto, Yuming He, Jewel Ossom, Qiao Zhang, Liuwan Zhu, Karina Arcaute, Masha Sosonkina, Hongyi Wu
Deapsecure Computational Training For Cybersecurity Students: Improvements, Mid-Stage Evaluation, And Lessons Learned, Wirawan Purwanto, Yuming He, Jewel Ossom, Qiao Zhang, Liuwan Zhu, Karina Arcaute, Masha Sosonkina, Hongyi Wu
University Administration Publications
DeapSECURE is a non-degree computational training program that provides a solid high-performance computing (HPC) and big-data foundation for cybersecurity students. DeapSECURE consists of six modules covering a broad spectrum of topics such as HPC platforms, big-data analytics, machine learning, privacy-preserving methods, and parallel programming. In the second year of this program, to improve the learning experience, we implemented a number of changes, such as grouping modules into two broad categories, "big-data" and "HPC"; creating a single cybersecurity storyline across the modules; and introducing post-workshop (optional) "hackshops." Two major goals of these changes are, firstly, to effectively engage students to maintain …
Promoting Diversity In Teaching Cybersecurity Through Gicl, Yuming He, Wu He, Xiaohong Yuan, Li Yang, Theo Bastiaens (Ed.)
Promoting Diversity In Teaching Cybersecurity Through Gicl, Yuming He, Wu He, Xiaohong Yuan, Li Yang, Theo Bastiaens (Ed.)
Information Technology & Decision Sciences Faculty Publications
In summary, it is necessary to develop a diverse group of K-12 students’ interest and skills in cybersecurity as cyber threats continue to grow. Evidence shows that educating the next generation of cyber workers is a crucial job that should begin in elementary school. To ensure the effectiveness of cybersecurity education and equity at the K-12 level, teachers must create thoughtful plans for considering communities’ interests and needs, and to continually reconsider what’s working and how to adjust our strategies, approaches, design, and research plan to meet their specific needs, challenges, and strengths, particularly with students from under-served and underrepresented …
A Literature Review Of Quantum Education In K-12 Level, Yuming He, Shenghua Zha, Wu He, Theo Bastiaens (Ed.)
A Literature Review Of Quantum Education In K-12 Level, Yuming He, Shenghua Zha, Wu He, Theo Bastiaens (Ed.)
Information Technology & Decision Sciences Faculty Publications
Quantum computing is an emerging technology paradigm of computing and has the potential to solve computational problems intractable using today’s classical computers or digital technology. Quantum computing is expected to be disruptive for many industries. The power of quantum computing technologies is based on the fundamentals of quantum mechanics, such as quantum superposition, quantum entanglement, or the no-cloning theorem. To build a highly trained and skilled quantum workforce that meets future industry needs, there is a need to introduce quantum concepts early on in K-12 schools since the learning of quantum is a lengthy process. As fundamental quantum concepts derive …
Internet-Of-Things Devices In Support Of The Development Of Echoic Skills Among Children With Autism Spectrum Disorder, Krzysztof J. Rechowicz, John B. Stull, Michelle M. Hascall, Saikou Y. Diallo, Kevin J. O'Brien
Internet-Of-Things Devices In Support Of The Development Of Echoic Skills Among Children With Autism Spectrum Disorder, Krzysztof J. Rechowicz, John B. Stull, Michelle M. Hascall, Saikou Y. Diallo, Kevin J. O'Brien
VMASC Publications
A significant therapeutic challenge for people with disabilities is the development of verbal and echoic skills. Digital voice assistants (DVAs), such as Amazon’s Alexa, provide networked intelligence to billions of Internet-of-Things devices and have the potential to offer opportunities to people, such as those diagnosed with autism spectrum disorder (ASD), to advance these necessary skills. Voice interfaces can enable children with ASD to practice such skills at home; however, it remains unclear whether DVAs can be as proficient as therapists in recognizing utterances by a developing speaker. We developed an Alexa-based skill called ASPECT to measure how well the DVA …