Open Access. Powered by Scholars. Published by Universities.®

Education Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Education

Smartsignplay: Lily Learns American Sign Language, Jeremiah Doody Nov 2016

Smartsignplay: Lily Learns American Sign Language, Jeremiah Doody

DHI Digital Projects Showcase

Many children are born either wholly or partially deaf, leaving parents to wonder how they can communicate with, and teach their child. For a hearing parent, unfamiliar with American Sign Language (ASL), traditional methods can be exasperating. Additional methods are helpful to reinforce this learning process. The teaching method needs to be effective, yet easy enough for a 2 year old to pick up. Likewise, the premise needs to actually hold the child’s attention. SmartSignPlay was proposed as an interactive smartphone, or tablet, game designed to make teaching ASL easier and fun. The game was to be point and click, …


Planning And Implementing A Successful Nsa-Nsf Gencyber Summer Cyber Academy, Bryson R. Payne, Tamirat Abegaz, Keith Antonia Oct 2016

Planning And Implementing A Successful Nsa-Nsf Gencyber Summer Cyber Academy, Bryson R. Payne, Tamirat Abegaz, Keith Antonia

KSU Proceedings on Cybersecurity Education, Research and Practice

The GenCyber program is jointly sponsored by the National Security Agency (NSA) and the National Science Foundation (NSF) to help faculty and cybersecurity experts provide summer cybersecurity camp experiences for K-12 students and teachers. The main objective of the program is to attract, educate, and motivate a new generation of young men and women to help address the nationwide shortage of trained cybersecurity professionals. The curriculum is flexible and centers on ten cybersecurity first principles. Currently, GenCyber provides cyber camp options for three types of audiences: students, teachers, and a combination of both teachers and students. In 2016, over 120 …


Teaching Security Of Internet Of Things In Using Raspberrypi, Oliver Nichols, Li Yang, Xiaohong Yuan Oct 2016

Teaching Security Of Internet Of Things In Using Raspberrypi, Oliver Nichols, Li Yang, Xiaohong Yuan

KSU Proceedings on Cybersecurity Education, Research and Practice

The Internet of Things (IoTs) is becoming a reality in today’s society. The IoTs can find its application in multiple domains including healthcare, critical infrastructure, transportation, and home and personal use. It is important to teach students importance and techniques that are essential in protecting IoTs. We design a series of hands-on labs in a smart home setting, which can exercise attack and protection of IoTs. Our hands-on labs use a Raspberry Pi and several diverse smart things that communicate through Z-Wave technology. Using this environment, students can operate a home automation system and learn security concepts by performing these …


Developing And Using Evidence-Based E-Learning Videos For Cybersecurity Education, Wu He, Xin Tian, Mohd Anwar Oct 2016

Developing And Using Evidence-Based E-Learning Videos For Cybersecurity Education, Wu He, Xin Tian, Mohd Anwar

KSU Proceedings on Cybersecurity Education, Research and Practice

To help people improve their knowledge and security self-efficacy in dealing with malware attacks that are relevant and meaningful to their organizations, we recently developed over 30 e-learning videos based on the major types of malware attacks we captured using the state-of-the-art anti-malware solution. The preliminary evaluation results of the videos are quite positive and indicate that these evidence-based e-learning videos have great potential to increase users’ security self-efficacy.


Teaching Static Call Analysis To Detect Anomalous Software Behavior, Jordan Shropshire, Philip Menard Oct 2016

Teaching Static Call Analysis To Detect Anomalous Software Behavior, Jordan Shropshire, Philip Menard

KSU Proceedings on Cybersecurity Education, Research and Practice

Malicious code detection is a critical part of any cyber security operation. Typically, the behavior of normal applications is modeled so that deviations from normal behavior can be identified. There are multiple approach to modeling good behavior but the most common approach is to observe applications’ system call activity. System calls are messages passed between user space applications and their underlying operating systems. The detection of irregular system call activity signals the presence of malicious software behavior. This method of malware-detection has been used successfully for almost two decades. Unfortunately, it can be difficult to cover this concept at the …


Acer Research Conference Proceedings (2016), Australian Council For Educational Research (Acer) Aug 2016

Acer Research Conference Proceedings (2016), Australian Council For Educational Research (Acer)

2009 - 2019 ACER Research Conferences

The focus of ACER’s Research Conference 2016 will be on what we are learning from research about ways of improving levels of STEM learning. Australia faces significant challenges in promoting improved science, technology, engineering and mathematics (STEM) learning in our schools. Research Conference 2016 will showcase research into what it will take to address these challenges, which include: the decline in Australian students’ mathematical and scientific ‘literacy’; the decline in STEM study in senior school; a shortage of highly qualified STEM subject teachers, and curriculum challenges. You will hear from researchers who work with teachers to engage students in studying …


Parallel Infeasibility Analysis, Wenting Zhao, Mark Liffiton, Faculty Advisor Apr 2016

Parallel Infeasibility Analysis, Wenting Zhao, Mark Liffiton, Faculty Advisor

John Wesley Powell Student Research Conference

Oral presentation abstract.


All Aboard, All Attuned And All Involved: Fostering Learner Engagement And Teamwork With Clickers In An Introductory Computer Science Course At Winthrop University, Patrick Guilbaud, Michael Whitney Feb 2016

All Aboard, All Attuned And All Involved: Fostering Learner Engagement And Teamwork With Clickers In An Introductory Computer Science Course At Winthrop University, Patrick Guilbaud, Michael Whitney

Winthrop Conference on Teaching and Learning

Modern education technology tools and learning systems provide the means for faculty to develop courses that offer connected and engaging learning opportunities. However, many courses, particularly those in the sciences and engineering disciplines, are not often designed to encourage collaboration, cooperation and teamwork.

Given the presence of a global and interconnected economy, it is critical for students to interact with classmates who hold diverse perspectives, experiences and opinions. Moreover, research shows that students who have had the opportunity to participate in learning activities with heterogeneous teams --early in their college life-- are more likely to develop lasting relationships with classmates …