Open Access. Powered by Scholars. Published by Universities.®

Education Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

2016

Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 82

Full-Text Articles in Education

Planning And Implementing A Successful Nsa-Nsf Gencyber Summer Cyber Academy, Bryson R. Payne, Tamirat Abegaz, Keith Antonia Dec 2016

Planning And Implementing A Successful Nsa-Nsf Gencyber Summer Cyber Academy, Bryson R. Payne, Tamirat Abegaz, Keith Antonia

Journal of Cybersecurity Education, Research and Practice

The GenCyber program is jointly sponsored by the National Security Agency (NSA) and the National Science Foundation (NSF) to help faculty and cybersecurity experts provide summer cybersecurity camp experiences for K-12 students and teachers. The main objective of the program is to attract, educate, and motivate a new generation of young men and women to help address the nationwide shortage of trained cybersecurity professionals. The curriculum is flexible and centers on ten cybersecurity first principles. Currently, GenCyber provides cyber camp options for three types of audiences: students, teachers, and a combination of both teachers and students. In 2016, over 120 …


Gender Bias In It Hiring Practices: An Ethical Analysis, Harmony L. Alford Dec 2016

Gender Bias In It Hiring Practices: An Ethical Analysis, Harmony L. Alford

Student Scholarship – Computer Science

With the current movement to increase the number of women in STEM-related careers, modified IT hiring practices may be considered debatably unethical. Studies cited in this work have asserted that female representation in STEM fields is integral not only to encouraging continued progression toward gender equality in the workplace but also to creating more inclusive products. In turn, some argue that when faced with reasonably comparable female and male candidates, a hiring manager should select the female candidate in order to increase the female representation in the company and provide a female perspective. However, it is simultaneously debatably unethical and …


Bgsu Minecraft Initiative Website, Jacob Gusching Dec 2016

Bgsu Minecraft Initiative Website, Jacob Gusching

Honors Projects

A website for the BGSU Minecraft Initiative, a program that uses Minecraft as an educational tool to engage younger students to learn. This website is a communication tool to showcase the work of BGSU students and to spread the knowledge and lesson to plans to interested parties.


College Of Engineering Senior Design Competition Fall 2016, University Of Nevada, Las Vegas Dec 2016

College Of Engineering Senior Design Competition Fall 2016, University Of Nevada, Las Vegas

Fred and Harriet Cox Senior Design Competition Projects

Part of every UNLV engineering student’s academic experience, the senior design project stimulates engineering innovation and entrepreneurship. Each student in their senior year chooses, plans, designs, and prototypes a product in this required element of the curriculum. A capstone to the student’s educational career, the senior design project encourages the student to use everything learned in the engineering program to create a practical, real world solution to an engineering challenge. The senior design competition helps focus the senior students in increasing the quality and potential for commercial application for their design projects. Judges from local industry evaluate the projects on …


Computerized Adaptive Assessment Of Infant-Toddler Language Development: Demonstration And Validation Of An App For Screening, Alan B. Cobo-Lewis, Curtis Meadow, George Markowsky, Barbara Z. Pearson, Shawn A. Collier, Rebecca E. Eilers Dec 2016

Computerized Adaptive Assessment Of Infant-Toddler Language Development: Demonstration And Validation Of An App For Screening, Alan B. Cobo-Lewis, Curtis Meadow, George Markowsky, Barbara Z. Pearson, Shawn A. Collier, Rebecca E. Eilers

Poster Presentations

We have developed a computerized adaptive test (an app), based on the MacArthur-Bates Communicative Development Inventories (CDI), that can rapidly gauge infant and toddler language development based on parent report. The app can be very useful in screening for developmental disabilities in IDEA Part C or Section 619. We will demonstrate the app and present validation data for toddlers.


Grading That Takes Into Account The Need To Learn From Mistakes, Francisco Zapata, Olga Kosheleva, Vladik Kreinovich Dec 2016

Grading That Takes Into Account The Need To Learn From Mistakes, Francisco Zapata, Olga Kosheleva, Vladik Kreinovich

Departmental Technical Reports (CS)

It is well known that the best way to learn the new material is to try it, to make mistakes, and to learn from these mistakes. However, the current grading scheme, in which the overall grade is a weighted average of the grades for all the assignments, exams, etc., does not encourage mistakes: any mistake decreases the grade on the corresponding assignment and thus, decreases the overall grade for the class. It is therefore desirable to modify the usual grading scheme, so that it will take into account -- and encourage -- learning by mistakes. Such a modification is proposed …


Lightcraft Previzion In Distance Education, Perry L. Cox Dec 2016

Lightcraft Previzion In Distance Education, Perry L. Cox

Open Access Theses

Visual Effects has continued to progress at an astonishing rate and green screen technology can be seen in all aspects of the video industry from Hollywood blockbusters down to training videos and distance education.

As video technology has increased, so has the quality and capability of distance education. Purdue University has set itself to be at the forefront of distance education. This study looked to evaluate Purdue's investment in the Lightcraft Technology's Previzion system and its impact on distance education at Purdue. There were 65 initial participants and this study compared the impact of two separate videos on their learning. …


Teaching Android Security Through Examples: A Publicly Available Database Of Vulnerable Apps, Daniel E. Krutz, Samuel A. Malachowsky Dec 2016

Teaching Android Security Through Examples: A Publicly Available Database Of Vulnerable Apps, Daniel E. Krutz, Samuel A. Malachowsky

Articles

Security is hard, and teaching security can be even harder. Here we describe a public educational activity to assist in the instruction of both students and developers in creating secure Android apps. Our set of activities includes example vulnerable applications, information about each vulnerability, steps on how to repair the vulnerabilities, and information about how to confirm that the vulnerability has been properly repaired. Our primary goal is to make these activities available to other instructors for use in their classrooms ranging from the K-12 to university settings. A secondary goal of this project is to foster interest in security …


Students' Explanations In Complex Learning Of Disciplinary Programming, Camilo Vieira Dec 2016

Students' Explanations In Complex Learning Of Disciplinary Programming, Camilo Vieira

Open Access Dissertations

Computational Science and Engineering (CSE) has been denominated as the third pillar of science and as a set of important skills to solve the problems of a global society. Along with the theoretical and the experimental approaches, computation offers a third alternative to solve complex problems that require processing large amounts of data, or representing complex phenomena that are not easy to experiment with. Despite the relevance of CSE, current professionals and scientists are not well prepared to take advantage of this set of tools and methods. Computation is usually taught in an isolated way from engineering disciplines, and therefore, …


Aiddata Gis International Fellowship: Ghana West-Africa, Jason N. Ready Dec 2016

Aiddata Gis International Fellowship: Ghana West-Africa, Jason N. Ready

International Development, Community and Environment (IDCE)

My internship, or fellowship as it was commonly referred to, was funded by a non-profit organization out of Williamsburg Virginia called AidData. This fellowship took place in in the country of Ghana, West-Africa beginning in May of 2016 and continued for 14 weeks with 40 hours each week. The objective of this internship was to provide in-depth training on the use of geographic Information Systems to Private and Public sectors within the country to allow for increased efficiency, and transparency through data visualization. In accordance with the requirement of Clark Universities GISDE master’s program this paper will delve into the …


Semi-Automated Tool For Providing Effective Feedback On Programming Assignments, Min Yan Beh, Swapna Gottipati, David Lo, Venky Shankararaman Dec 2016

Semi-Automated Tool For Providing Effective Feedback On Programming Assignments, Min Yan Beh, Swapna Gottipati, David Lo, Venky Shankararaman

Research Collection School Of Computing and Information Systems

Human grading of introductory programming assignments is tedious and error-prone, hence researchers have attempted to develop tools that support automatic assessment of programming code. However, most such efforts often focus only on scoring solutions, rather than assessing whether students correctly understand the problems. To aid the students improve programming skills, effective feedback on programming assignments plays an important role. Individual feedback generation is tedious and painstaking process. We present a tool that not only automatically generates the static and dynamic program analysis outcomes, but also clusters similar code submissions to provide scalable and effective feedback to the students. We studied …


‘Tweetboard’ – A Case Study Of Developing A Micro-Blogging Platform For Higher Education, Shao Cheh Joyce Hsu, Gan, Benjamin, Jin Lee, Shu Hui Sheryl Lim, Xie Yan Jeremy Lim, Thomas Menkhoff, Si Xian Sherman Tan, Charles Jason Woodard, Qiu Cheng Yap Dec 2016

‘Tweetboard’ – A Case Study Of Developing A Micro-Blogging Platform For Higher Education, Shao Cheh Joyce Hsu, Gan, Benjamin, Jin Lee, Shu Hui Sheryl Lim, Xie Yan Jeremy Lim, Thomas Menkhoff, Si Xian Sherman Tan, Charles Jason Woodard, Qiu Cheng Yap

Research Collection School Of Computing and Information Systems

This paper reports experiences made at an Asian university in developing a social media platform based on Twitter in the context of a final year capstone project where information systems management students get an opportunity to solve ‘a real-world problem for a real client’. In this case study, the challenge was provided by a faculty member’s request for an interactive social media application which engages less outspoken students in class via a social medium they are familiar with: Twitter. We reconstruct the project’s evolution; describe the main features of the application called ‘TweetBoard’ and share lessons learned in developing a …


Smartsignplay: Lily Learns American Sign Language, Jeremiah Doody Nov 2016

Smartsignplay: Lily Learns American Sign Language, Jeremiah Doody

DHI Digital Projects Showcase

Many children are born either wholly or partially deaf, leaving parents to wonder how they can communicate with, and teach their child. For a hearing parent, unfamiliar with American Sign Language (ASL), traditional methods can be exasperating. Additional methods are helpful to reinforce this learning process. The teaching method needs to be effective, yet easy enough for a 2 year old to pick up. Likewise, the premise needs to actually hold the child’s attention. SmartSignPlay was proposed as an interactive smartphone, or tablet, game designed to make teaching ASL easier and fun. The game was to be point and click, …


From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman Oct 2016

From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman

Leila A. Halawi

Issues associated with information security are numerous and diverse. Since the majority of organizational actions rely greatly on information and communication technologies, Information Systems (IS) security is now a main concern for firms, governments, institutes, and society as a whole. As a result, a plethora of graduate programs have been created, covering nearly every aspect of IS security. The authors review the current state of the IS industry presented in the literature, and identify a panel of IS experts in which to explore current job skill needs using a “Developing a Curriculum,” DACUM, process to support curriculum design for two …


Identification Of The Emergent Leaders Within A Cse Professional Development Program, Tracie Evans Reding, Brian Dorn, Neal Grandgenett, Harvey Siy, Jon Youn, Qiuming Zhu, Carol A. Engelmann Oct 2016

Identification Of The Emergent Leaders Within A Cse Professional Development Program, Tracie Evans Reding, Brian Dorn, Neal Grandgenett, Harvey Siy, Jon Youn, Qiuming Zhu, Carol A. Engelmann

Computer Science Faculty Publications

The need for high quality, sustainable Computer Science Education (CSE) professional development (PD) at the grades K-12 level is essential to the success of the global CSE initiatives. This study investigates the use of Social Network Analysis (SNA) to identify emergent teacher leaders within a high quality CSE PD program. The CSE PD program was designed and implemented through collaboration between the computer science and teacher education units at a Midwestern metropolitan university in North America. A unique feature of this specific program is in the intentional development of a social network. This study discusses the importance of social networks, …


Design Implications Of Changing Student Demographics, Andy Igonor, Natalya Koehler Oct 2016

Design Implications Of Changing Student Demographics, Andy Igonor, Natalya Koehler

Learning Showcase 2016: A Celebration of Discovery, Transformation and Success

Many non-traditional higher education institutions have built their cyber security and computer science programs {CSCS) to cater to the needs of adult, working learners. Focusing on this demographic has implications for course and program design. Design approaches have therefore focused on strategies aimed at translating knowledge into learning nuggets specific to the adult learner, enabling day one job-readiness upon graduation. Recently, there has been increased focus on CSCS education at the high school level. The computer science for all initiative was announced recently by US President Obama, and there have been increased creativity on the part of higher education institutions …


Planning And Implementing A Successful Nsa-Nsf Gencyber Summer Cyber Academy, Bryson R. Payne, Tamirat Abegaz, Keith Antonia Oct 2016

Planning And Implementing A Successful Nsa-Nsf Gencyber Summer Cyber Academy, Bryson R. Payne, Tamirat Abegaz, Keith Antonia

KSU Proceedings on Cybersecurity Education, Research and Practice

The GenCyber program is jointly sponsored by the National Security Agency (NSA) and the National Science Foundation (NSF) to help faculty and cybersecurity experts provide summer cybersecurity camp experiences for K-12 students and teachers. The main objective of the program is to attract, educate, and motivate a new generation of young men and women to help address the nationwide shortage of trained cybersecurity professionals. The curriculum is flexible and centers on ten cybersecurity first principles. Currently, GenCyber provides cyber camp options for three types of audiences: students, teachers, and a combination of both teachers and students. In 2016, over 120 …


Teaching Security Of Internet Of Things In Using Raspberrypi, Oliver Nichols, Li Yang, Xiaohong Yuan Oct 2016

Teaching Security Of Internet Of Things In Using Raspberrypi, Oliver Nichols, Li Yang, Xiaohong Yuan

KSU Proceedings on Cybersecurity Education, Research and Practice

The Internet of Things (IoTs) is becoming a reality in today’s society. The IoTs can find its application in multiple domains including healthcare, critical infrastructure, transportation, and home and personal use. It is important to teach students importance and techniques that are essential in protecting IoTs. We design a series of hands-on labs in a smart home setting, which can exercise attack and protection of IoTs. Our hands-on labs use a Raspberry Pi and several diverse smart things that communicate through Z-Wave technology. Using this environment, students can operate a home automation system and learn security concepts by performing these …


Developing And Using Evidence-Based E-Learning Videos For Cybersecurity Education, Wu He, Xin Tian, Mohd Anwar Oct 2016

Developing And Using Evidence-Based E-Learning Videos For Cybersecurity Education, Wu He, Xin Tian, Mohd Anwar

KSU Proceedings on Cybersecurity Education, Research and Practice

To help people improve their knowledge and security self-efficacy in dealing with malware attacks that are relevant and meaningful to their organizations, we recently developed over 30 e-learning videos based on the major types of malware attacks we captured using the state-of-the-art anti-malware solution. The preliminary evaluation results of the videos are quite positive and indicate that these evidence-based e-learning videos have great potential to increase users’ security self-efficacy.


Teaching Static Call Analysis To Detect Anomalous Software Behavior, Jordan Shropshire, Philip Menard Oct 2016

Teaching Static Call Analysis To Detect Anomalous Software Behavior, Jordan Shropshire, Philip Menard

KSU Proceedings on Cybersecurity Education, Research and Practice

Malicious code detection is a critical part of any cyber security operation. Typically, the behavior of normal applications is modeled so that deviations from normal behavior can be identified. There are multiple approach to modeling good behavior but the most common approach is to observe applications’ system call activity. System calls are messages passed between user space applications and their underlying operating systems. The detection of irregular system call activity signals the presence of malicious software behavior. This method of malware-detection has been used successfully for almost two decades. Unfortunately, it can be difficult to cover this concept at the …


Smu Enhances Curriculum And Expands Offering To Prepare Undergraduates For The Digital Age, Singapore Management University Oct 2016

Smu Enhances Curriculum And Expands Offering To Prepare Undergraduates For The Digital Age, Singapore Management University

SMU Press Releases

Demand for infocomm professionals in Singapore is outpacing supply with 30,000 new infocomm jobs expected by 2020. The Infocomm Media 2025 masterplan has identified salient trends that are significant for the next decade, these include Big Data & Analytics, Internet of Things and Cybersecurity. The masterplan also highlighted future key infocomm job areas: Software Development, Cybersecurity, Data Analytics, and Network Infrastructure. In response to these industry trends and demand, SMU has strengthened its undergraduate curriculum in three schools to contribute to the 'future-proofing' of Singapore. The School of Information Systems (SIS) has revised its undergraduate curriculum in response to changes …


Leveraging Competency Framework To Improve Teaching And Learning: A Methodological Approach, Venky Shankararaman, Joelle Elmaleh Sep 2016

Leveraging Competency Framework To Improve Teaching And Learning: A Methodological Approach, Venky Shankararaman, Joelle Elmaleh

Research Collection School Of Computing and Information Systems

A number of engineering education programs have defined learning outcomes and course-level competencies, and conducted assessments at the program level to determine areas for continuous improvement. However, many of these programs have not implemented a comprehensive competency framework to support the actual delivery and assessment of an individual course. This paper highlights how a competency framework can be used across the life cycle of a course to effectively deliver and assess course content, and give valuable, timely feedback to students thus, improving teaching, student motivation and learning. A framework for leveraging course competencies during course design and delivery is presented, …


Acer Research Conference Proceedings (2016), Australian Council For Educational Research (Acer) Aug 2016

Acer Research Conference Proceedings (2016), Australian Council For Educational Research (Acer)

2009 - 2019 ACER Research Conferences

The focus of ACER’s Research Conference 2016 will be on what we are learning from research about ways of improving levels of STEM learning. Australia faces significant challenges in promoting improved science, technology, engineering and mathematics (STEM) learning in our schools. Research Conference 2016 will showcase research into what it will take to address these challenges, which include: the decline in Australian students’ mathematical and scientific ‘literacy’; the decline in STEM study in senior school; a shortage of highly qualified STEM subject teachers, and curriculum challenges. You will hear from researchers who work with teachers to engage students in studying …


Creating Art Patterns With Math And Code, Boyan Kostadinov Aug 2016

Creating Art Patterns With Math And Code, Boyan Kostadinov

Publications and Research

The goal of this talk is to showcase some visualization projects that we developed for a 3-day Code in R summer program, designed to inspire the creative side of our STEM students by engaging them with computational projects that we developed with the purpose of mixing calculus level math and code to create complex geometric patterns. One of the goals of this program was to attract more minority and female students into applied math and computer science majors.

The projects are designed to be implemented using the high-level, open-source and free computational environment R, a popular software in industry for …


Choosing Management Information Systems As A Major: Understanding The Smifactors For Mis, Thomas W. Ferratt, Stephen R. Hall, Jayesh Prasad, Donald E. Wynn Aug 2016

Choosing Management Information Systems As A Major: Understanding The Smifactors For Mis, Thomas W. Ferratt, Stephen R. Hall, Jayesh Prasad, Donald E. Wynn

Donald Wynn

Given declining management information systems (MIS) enrollments at our university, we seek to understand our students‘ selection of a major. Prior studies have found that students choose a major based on a number of factors, with subject matter interest consistently being most important. We contribute to the literature by developing a deeper understanding of what is meant by subject matter interest, which we refer to as smiFactors, for MIS as a major and career. Based on a qualitative analysis of open-ended survey questions completed by undergraduate business students, we confirm a number of smiFactors for MIS gleaned from recent studies …


Choosing Management Information Systems As A Major: Understanding The Smifactors For Mis, Thomas W. Ferratt, Stephen R. Hall, Jayesh Prasad, Donald E. Wynn Aug 2016

Choosing Management Information Systems As A Major: Understanding The Smifactors For Mis, Thomas W. Ferratt, Stephen R. Hall, Jayesh Prasad, Donald E. Wynn

Thomas Ferratt

Given declining management information systems (MIS) enrollments at our university, we seek to understand our students‘ selection of a major. Prior studies have found that students choose a major based on a number of factors, with subject matter interest consistently being most important. We contribute to the literature by developing a deeper understanding of what is meant by subject matter interest, which we refer to as smiFactors, for MIS as a major and career. Based on a qualitative analysis of open-ended survey questions completed by undergraduate business students, we confirm a number of smiFactors for MIS gleaned from recent studies …


Definition Of A Method For The Formulation Of Problems To Be Solved With High Performance Computing, Ramya Peruri Aug 2016

Definition Of A Method For The Formulation Of Problems To Be Solved With High Performance Computing, Ramya Peruri

Master of Science in Computer Science Theses

Computational power made available by current technology has been continuously increasing, however today’s problems are larger and more complex and demand even more computational power. Interest in computational problems has also been increasing and is an important research area in computer science. These complex problems are solved with computational models that use an underlying mathematical model and are solved using computer resources, simulation, and are run with High Performance Computing. For such computations, parallel computing has been employed to achieve high performance. This thesis identifies families of problems that can best be solved using modelling and implementation techniques of parallel …


A Usability Assessment For A Career Planning Educational Video Game, Jiaqi Wang Aug 2016

A Usability Assessment For A Career Planning Educational Video Game, Jiaqi Wang

Open Access Theses

This study focused on the design, implementation and usability assessment of an educational 2D iPad job matching game The Place You’ll Go (TPYG), which meant for matching student skill sets with career profiles. The development of the game is conducted in collaboration with Purdue University’s Krannert School of Management and Polytech Institute. A total of 7 subjects, as high school teachers, participated in the usability study. TPYG as one possible solution for job matching data visualization, did not provide players with a good experience. However, conclusions and findings can be used in similar education game development. Based on survey and …


Does A Taste Of Computing Increase Computer Science Enrollment?, Steven Mcgee, Randi Mcgee-Tekula, Jennifer Duck, Taylor White, Ronald I. Greenberg, Lucia Dettori, Dale F. Reed, Brenda Wilkerson, Don Yanek, Andrew Rasmussen, Gail Chapman Aug 2016

Does A Taste Of Computing Increase Computer Science Enrollment?, Steven Mcgee, Randi Mcgee-Tekula, Jennifer Duck, Taylor White, Ronald I. Greenberg, Lucia Dettori, Dale F. Reed, Brenda Wilkerson, Don Yanek, Andrew Rasmussen, Gail Chapman

Computer Science: Faculty Publications and Other Works

This study investigated the impact of the Exploring Computer Science (ECS) program on the likelihood that students of all races and gender would pursue further computer science coursework in high school. ECS is designed to foster deep engagement through equitable inquiry around computer science concepts. If the course provides a meaningful and relevant experience, it will increase students' expectancies of success as well as increase their perceived value for the field of computer science. Using survey research, we sought to measure whether the relevance of students' course experiences influenced their expectancies and value and whether those attitudes predicted whether students …


Practice And Refactoring Log: A Reflection Based Learning Strategy To Improve The Fluency Of Computing Students In Writing Computer Programs, Elizabeth Dancy, El Sayed Mahmoud Jul 2016

Practice And Refactoring Log: A Reflection Based Learning Strategy To Improve The Fluency Of Computing Students In Writing Computer Programs, Elizabeth Dancy, El Sayed Mahmoud

Faculty Publications and Scholarship

The relationship between reflection and learning is evident. Reflection plays a significant role in learning by encouraging insight and complex learning. However, most students consider their work experiences at school as isolated and unrelated events. This work aims to investigate how to improve the students’ fluency in writing computer programs through reflection. A new deliverable, the Practice and Refactoring Log (“PAR Log”), is requested for each assignment in order to engage students in the process of making meaning from their experiences when completing their assignments. The PAR Log shows and justifies all changes through the assignment development cycle. Two student …