Open Access. Powered by Scholars. Published by Universities.®

Education Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Education

The Shaping Of Things That Are: How Airplane Windows Took Their Shape, Morgan Lopez Oct 2017

The Shaping Of Things That Are: How Airplane Windows Took Their Shape, Morgan Lopez

Student Works

Have you ever wondered why your airplane's windows are rounded? It is not for aesthetic appeal.

The first commercial jetliner windows' sole purpose was appearance; a squared window afforded an impressive view of the earth, but the view was not without consequence.


Real Data Is Messy... And Manageable, Beverly Wood, Carl Clark Jan 2017

Real Data Is Messy... And Manageable, Beverly Wood, Carl Clark

Publications

Using real data in an introductory statistics course is a delicate balance between reality and manageability. The internet is awash with data that is useful for students to answer questions of interest to them but it is not always formatted as neatly as textbook data. The ASA's recently endorsed GAISE College Report 2016 points to the plausibility of considering multivariable thinking even if only at a rudimentary level. With both messy and multivariable data in mind, we present some activities/projects and sources for data to give introductory students the opportunity to engage with real data.


Using Journals To Assess Non-Stem Student Learning In Stem Courses: A Case Study In Cybersecurity Education, Gary Kessler, Glenn S. Dardick, Douglas L. Holton Jan 2017

Using Journals To Assess Non-Stem Student Learning In Stem Courses: A Case Study In Cybersecurity Education, Gary Kessler, Glenn S. Dardick, Douglas L. Holton

Publications

Embry-Riddle Aeronautical University offers a minor course of study in cybersecurity as an option in our undergraduate Homeland Security program. Since the students are, by and large, social scientists, the focus of the program is to build hyper-awareness of how cybersecurity integrates within their professional aspirations rather than to provide cybersecurity career-level proficiency. Assessing student learning of the technical aspects cannot be performed using traditional tests, as they would not properly measure what the students are learning in a practical sense. Instead, we employ journals and self-reflection to ask the students to express and demonstrate their learning. Although somewhat harder …