Open Access. Powered by Scholars. Published by Universities.®

Education Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Education

Read And Publish: What Can Libraries Expect?, Josh Horowitz Oct 2019

Read And Publish: What Can Libraries Expect?, Josh Horowitz

Charleston Library Conference

The author provides a publisher's perspective on the challenges and opportunities faced by a mid-sized society in navigating the current transition to open access licensing models.


Proposal For A Joint Cybersecurity And Information Technology Management Program, Christopher Simpson, Debra Bowen, William Reid, James Juarez Oct 2019

Proposal For A Joint Cybersecurity And Information Technology Management Program, Christopher Simpson, Debra Bowen, William Reid, James Juarez

KSU Proceedings on Cybersecurity Education, Research and Practice

Cybersecurity and Information Technology Management programs have many similarities and many similar knowledge, skills, and abilities are taught across both programs. The skill mappings for the NICE Framework and the knowledge units required to become a National Security Agency and Department of Homeland Security Center of Academic Excellence in Cyber Defense Education contain many information technology management functions. This paper explores one university’s perception on how a joint Cybersecurity and Information Technology Management program could be developed to upskill students to be work force ready.


Adversarial Thinking: Teaching Students To Think Like A Hacker, Frank Katz Oct 2019

Adversarial Thinking: Teaching Students To Think Like A Hacker, Frank Katz

KSU Proceedings on Cybersecurity Education, Research and Practice

Today’s college and university cybersecurity programs often contain multiple laboratory activities on various different hardware and software-based cybersecurity tools. These include preventive tools such as firewalls, virtual private networks, and intrusion detection systems. Some of these are tools used in attacking a network, such as packet sniffers and learning how to craft cross-site scripting attacks or man-in-the-middle attacks. All of these are important in learning cybersecurity. However, there is another important component of cybersecurity education – teaching students how to protect a system or network from attackers by learning their motivations, and how they think, developing the students’ “abilities to …


Integrating Mathematics And Biology In The Classroom: A Compendium Of Case Studies And Labs, Becky Sanft, Anne Walter Oct 2019

Integrating Mathematics And Biology In The Classroom: A Compendium Of Case Studies And Labs, Becky Sanft, Anne Walter

Annual Symposium on Biomathematics and Ecology Education and Research

No abstract provided.


Patterns In Color Perception, Madeline Henson, Taimur Iftikhar Apr 2019

Patterns In Color Perception, Madeline Henson, Taimur Iftikhar

Student Symposium

Synesthesia is a neurological condition that forces individuals to process a lot of different senses at once. These different senses can be stimulated by anything; for example, if one hears some sounds, they might also perceive those sounds as colors and vice versa. Another form of Synesthesia, termed Grapheme-Color Synesthesia, can occur when one looks at different characters in a language and they see different colors generated in their brain. The amount of colors a person sees by looking at different characters varies. Our goal for our project was to figure out how different languages stimulate different neurological senses for …


Perception Is Reality?, Madeline Henson, Taimur Iftikhar Apr 2019

Perception Is Reality?, Madeline Henson, Taimur Iftikhar

Student Symposium

Related presentation in Panel 1A: Brain Games


A Storytelling, Social-Belonging Intervention In An Introductory Computer Science Course, Shanon Reckinger, Chris Gregg Mar 2019

A Storytelling, Social-Belonging Intervention In An Introductory Computer Science Course, Shanon Reckinger, Chris Gregg

ASEE IL-IN Section Conference

A brief social-belonging intervention was tested in two introductory computer science (CS) courses. This intervention used storytelling to help improve a sense of belonging and establish the importance of persistence in the classroom. In previous experiments using this one-time intervention, there were significant results (Walton & Brady, 2017). Recent CS graduates were interviewed about their own struggles and failures in their computer science courses. These interviews were videotaped and edited to follow the storytelling pattern of a struggle, followed by an attribution, and concluding with redemption. Interviewees were selected to represent a diverse group of students including both dominant majority …


Teaching Young Learners Computational Thinking, Tingxuan Li, Shengwei An, Xuan Wang, Hengrong Du, Guanhong Tao Mar 2019

Teaching Young Learners Computational Thinking, Tingxuan Li, Shengwei An, Xuan Wang, Hengrong Du, Guanhong Tao

Engagement & Service-Learning Summit

No abstract provided.