Open Access. Powered by Scholars. Published by Universities.®

Education Commons

Open Access. Powered by Scholars. Published by Universities.®

2018

Computer Sciences

Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 86

Full-Text Articles in Education

Using Case Studies To Teach Cybersecurity Courses, Yu Cai Dec 2018

Using Case Studies To Teach Cybersecurity Courses, Yu Cai

Journal of Cybersecurity Education, Research and Practice

This paper introduces a holistic and case-analysis teaching model by integrating case studies into cybersecurity courses. The proposed model starts by analyzing real-world cyber breaches. Students look into the details of these attacks and learn how these attacks took place from the beginning to the end. During the process of case analysis, a list of security topics reflecting different aspects of these breaches is introduced. Through guided in-class discussion and hands-on lab assignments, student learning in lecture will be reinforced. Overall, the entire cybersecurity course is driven by case studies. The proposed model is great for teaching cybersecurity. First, the …


An Examination Of Cybersecurity Knowledge Transfer: Teaching, Research, And Website Security At U.S. Colleges And Universities, Aditya Gupta, James R. Wolf Dec 2018

An Examination Of Cybersecurity Knowledge Transfer: Teaching, Research, And Website Security At U.S. Colleges And Universities, Aditya Gupta, James R. Wolf

Journal of Cybersecurity Education, Research and Practice

This work seeks to answer the question: Does faculty cybersecurity knowledge gained from teaching and research transfer to other IT units in the university? Specifically, do colleges and universities that excel in cybersecurity teaching and research have more secure websites? This work explores a unique setting where the knowledge of the source and recipient are both directly related and observable without outside intervention. Our study employed data from 591 U.S. colleges and universities, the National Centers of Academic Excellence (CAE) program, accepted paper data from the ACM Conference on Computer and Communications Security (CCS) and the IEEE Symposium on Security …


College Of Engineering Senior Design Competition Fall 2018, University Of Nevada, Las Vegas Dec 2018

College Of Engineering Senior Design Competition Fall 2018, University Of Nevada, Las Vegas

Fred and Harriet Cox Senior Design Competition Projects

Part of every UNLV engineering student’s academic experience, the senior design project stimulates engineering innovation and entrepreneurship. Each student in their senior year chooses, plans, designs, and prototypes a product in this required element of the curriculum. A capstone to the student’s educational career, the senior design project encourages the student to use everything learned in the engineering program to create a practical, real world solution to an engineering challenge. The senior design competition helps focus the senior students in increasing the quality and potential for commercial application for their design projects. Judges from local industry evaluate the projects on …


Data Mining Approach To The Identification Of At-Risk Students, Li Chin Ho, Kyong Jin Shim Dec 2018

Data Mining Approach To The Identification Of At-Risk Students, Li Chin Ho, Kyong Jin Shim

Research Collection School Of Computing and Information Systems

In recent years, the use of digital tools and technologies in educational institutions are continuing to generate large amounts of digital traces of student learning behavior. This study presents a proof-of-concept analytics system that can detect at-risk students along their learning journey. Educators can benefit from the early detection of at-risk students by understanding factors which may lead to failure or drop-out. Further, educators can devise appropriate intervention measures before the students drop out of the course. Our system was built using SAS ® Enterprise Miner (EM) and SAS ® JMP Pro.


An Architectural Design And Evaluation Of An Affective Tutoring System For Novice Programmers, Hua Leong Fwa Dec 2018

An Architectural Design And Evaluation Of An Affective Tutoring System For Novice Programmers, Hua Leong Fwa

Research Collection School Of Computing and Information Systems

Affect is prevalent in learning and it influences students’ learning achievement. This paper details the design and evaluation of an Affective Tutoring System (ATS) that tutors student in computer programming. Although most ATSs are purpose built for a specific domain, making adaptation to another domain difficult, this ATS is architected for adaptability and extensibility. This study also addresses a lack of research exploring the theories and methods of integrating affect and learning within the learning process by proposing methods of regulating the negative affect of students. Both quantitative and qualitative techniques were used for evaluation of the effectiveness of the …


Applying Design Thinking To Student Outreach Projects: Experiences From An Information Systems School, Swapna Gottipati, Venky Shankararaman, Alan Megargel Dec 2018

Applying Design Thinking To Student Outreach Projects: Experiences From An Information Systems School, Swapna Gottipati, Venky Shankararaman, Alan Megargel

Research Collection School Of Computing and Information Systems

As countries turn into Smart Nations, Infocom Technology plays a key role in enhancing their competitiveness through high skilled workforces. Reaching to younger generations and attracting them to computing programs such as Information Systems (IS) and Computer Science (CS) is a key challenge faced by universities. Many high quality students from junior colleges either don’t choose IS programs or choose IS programs as their last option during the application process. A School of Information Systems (SIS) from a large metropolitan university decided to implement an innovative outreach program to attract high quality high school aka Junior College (JC) students. JC …


Effectiveness Of Physical Robot Versus Robot Simulator In Teaching Introductory Programming, Oka Kurniawan, Norman Tiong Seng Lee, Subhajit Datta, Nachamma Sockalingam, Pey Lin Leong Dec 2018

Effectiveness Of Physical Robot Versus Robot Simulator In Teaching Introductory Programming, Oka Kurniawan, Norman Tiong Seng Lee, Subhajit Datta, Nachamma Sockalingam, Pey Lin Leong

Research Collection School Of Computing and Information Systems

This study reports the use of a physical robot and robot simulator in an introductory programming course in a university and measures students' programming background conceptual learning gain and learning experience. One group used physical robots in their lessons to complete programming assignments, while the other group used robot simulators. We are interested in finding out if there is any difference in the learning gain and experiences between those that use physical robots as compared to robot simulators. Our results suggest that there is no significant difference in terms of students' learning between the two approaches. However, the control group …


From Gig Economy To Gig Education, Olga Kosheleva, Julian Viera Jr., Vladik Kreinovich Nov 2018

From Gig Economy To Gig Education, Olga Kosheleva, Julian Viera Jr., Vladik Kreinovich

Departmental Technical Reports (CS)

Modern economy has benefited from gig economy idea, where, instead of hiring permanent employees, a company assigns each task to the person who is the most efficient in performing this task. This way, each task is performed in the best possible way -- by a person who is the most suited for this job. Why not extend this idea to education? Every student deserves the best possible teacher in every topic. So why not have a teacher who is the best in town in explaining quadratic equations teach quadratic equations to all the students from the town? In this paper, …


Should School Feel Like A Family: Lessons From Business Controversy As Interpreted By Decision Making Theory, Olga Kosheleva, Julian Viera Jr., Vladik Kreinovich Nov 2018

Should School Feel Like A Family: Lessons From Business Controversy As Interpreted By Decision Making Theory, Olga Kosheleva, Julian Viera Jr., Vladik Kreinovich

Departmental Technical Reports (CS)

Traditional business theory promoted the ideal of business as a family: everyone should feel good about each other, all employees should feel good working together towards a joint goal. Recently, however, researchers claim that the well-promoted ideal is unattainable, it is a ruse causing everyone to overwork. Instead, these researchers propose a non-emotional collaboration of adults working temporarily on a joint project. In this paper, we show that this new trend is not just based on anecdotal evidence, it actually has a solid foundation in decision theory. So maybe we should apply this new trend to teaching too - and …


Class Discussion Management And Analysis Application, Venky Shankararaman, Swapna Gottipati, Seshan Ramaswami, Chirag Chhablan Nov 2018

Class Discussion Management And Analysis Application, Venky Shankararaman, Swapna Gottipati, Seshan Ramaswami, Chirag Chhablan

Research Collection School Of Computing and Information Systems

Discussion-based teaching is popular in several courses because it creates opportunities for students to practice important skills useful for the working environment. In order to make this pedagogy impactful and effective, instructors employ technologies such as online discussion forums and student response systems to conduct and manage classroom discussions. More recently mobile devices have become prevalent and researchers have been exploring how this device can help support education. In this paper we report the innovative use of mobile technology and supporting backend tools to manage classroom discussions. We have implemented a class discussion and management application, LiveClass. This application records …


Vt-Revolution: Interactive Programming Tutorials Made Possible, Lingfeng Bao, Zhenchang Xing, Xin Xia, David Lo, Shanping Li Nov 2018

Vt-Revolution: Interactive Programming Tutorials Made Possible, Lingfeng Bao, Zhenchang Xing, Xin Xia, David Lo, Shanping Li

Research Collection School Of Computing and Information Systems

Programming video tutorials showcase programming tasks and associated workflows. Although video tutorials are easy to create, it isoften difficult to explore the captured workflows and interact withthe programs in the videos. In this work, we propose a tool named VTRevolution – an interactive programming video tutorial authoring system. VTRevolution has two components: 1) a tutorial authoring system leverages operating system level instrumentation to log workflow history while tutorial authors are creating programming video tutorials; 2) a tutorial watching system enhances the learning experience of video tutorials by providing operation history and timeline-based browsing interactions. Our tutorial authoring system does not …


Improving Knowledge Tracing Model By Integrating Problem Difficulty, Sein Minn, Feida Zhu, Michel C. Desmarais Nov 2018

Improving Knowledge Tracing Model By Integrating Problem Difficulty, Sein Minn, Feida Zhu, Michel C. Desmarais

Research Collection School Of Computing and Information Systems

Intelligent Tutoring Systems (ITS) are designed for providing personalized instructions to students with the needs of their skills. Assessment of student knowledge acquisition dynamically is nontrivial during her learning process with ITS. Knowledge tracing, a popular student modeling technique for student knowledge assessment in adaptive tutoring, which is used for tracing student's knowledge state and detecting student's knowledge acquisition by using decomposed individual skill or problems with a single skill per problem. Unfortunately, recent KT models fail to deal with practices of complex skill composition and variety of concepts included in a problem simultaneously. Our goal is to investigate a …


A Mixed Method Study Of Prospective Teachers' Epistemic Beliefs And Web Evaluation Strategies Concerning Hoax Websites, Jennifer Coccaro-Pons Oct 2018

A Mixed Method Study Of Prospective Teachers' Epistemic Beliefs And Web Evaluation Strategies Concerning Hoax Websites, Jennifer Coccaro-Pons

FIU Electronic Theses and Dissertations

Teachers need to be equipped with the tools necessary to evaluate content on the Internet and determine if it is a credible source, or a hoax website since they are expected to instruct and prepare students on how to evaluate the sites which is now a relevant phenomenon. The purpose of the mixed‑method study was to obtain an understanding of the web evaluation strategies of prospective teachers regarding the evaluation of hoax websites and how their epistemic beliefs may influence their evaluation. Another aspect of this study was to find out what outcomes resulted from providing guidance, or not to …


Setting Up A Low-Cost Lab Management System For A Multi-Purpose Computing Laboratory Using Virtualisation Technology, Heng Ngee Mok, Wee Kiat Tan Oct 2018

Setting Up A Low-Cost Lab Management System For A Multi-Purpose Computing Laboratory Using Virtualisation Technology, Heng Ngee Mok, Wee Kiat Tan

Heng Ngee MOK

This paper describes how a generic computer laboratory equipped with 52 workstations is set up for teaching IT-related courses and other general purpose usage. The authors have successfully constructed a lab management system based on decentralised, client-side software virtualisation technology using Linux and free software tools from VMware that fulfils the requirements of fast "switch over" time between consecutive lab sessions, the ability to support a wide range of IT courses and usage scenarios, low cost, easy maintenance, and a sandboxed environment for potentially disruptive IT security lab exercises. Sufficient implementation details are provided so that readers can build a …


Teaching Tip: The Flipped Classroom, Heng Ngee Mok Oct 2018

Teaching Tip: The Flipped Classroom, Heng Ngee Mok

Heng Ngee MOK

The flipped classroom has been gaining popularity in recent years. In theory, flipping the classroom appears sound: passive learning activities such as unidirectional lectures are pushed to outside class hours in the form of videos, and precious class time is spent on active learning activities. Yet the courses for information systems (IS) undergraduates at the university that the author is teaching at are still conducted in the traditional lecture-in-class, homework-after-class style. In order to increase students’ engagement with the course content and to improve their experience with the course, the author implemented a trial of the flipped classroom model for …


Mapping Knowledge Units Using A Learning Management System (Lms) Course Framework, Casey Rackley Oct 2018

Mapping Knowledge Units Using A Learning Management System (Lms) Course Framework, Casey Rackley

KSU Proceedings on Cybersecurity Education, Research and Practice

ABSTRACT

The purpose of this paper is to examine the outcomes of using a Learning Management System (LMS) course as a framework for mapping the Centers of Academic Excellence in Cyber Defense (CAE-CD) 2019 Knowledge Units (KU) to college courses. The experience shared herein will be useful to faculty who are interested in performing the mapping and applying for CAE-CDE designation.


Cybersecurity Education Employing Experiential Learning, Travis Lowe, Casey Rackley Oct 2018

Cybersecurity Education Employing Experiential Learning, Travis Lowe, Casey Rackley

KSU Proceedings on Cybersecurity Education, Research and Practice

ABSTRACT

The purpose of this paper is to discuss a curriculum design that employs Kolb’s Experiential Learning Theory stages and Kolb’s Learning Styles in four consecutive class sessions. The challenge each class is to present students with perplexing and often frustrating network problems that someday might be encountered on the job. By using Kolb’s theory, students address those problems from the perspective of each learning style, while passing through each phase of the learning cycle. As a result, students gain stronger cognitive thinking skills and hands-on troubleshooting skills in preparation for work as network administrators or cybersecurity analysts.


Study Of Physical Layer Security And Teaching Methods In Wireless Communications, Zhijian Xie, Christopher Horne Oct 2018

Study Of Physical Layer Security And Teaching Methods In Wireless Communications, Zhijian Xie, Christopher Horne

KSU Proceedings on Cybersecurity Education, Research and Practice

In most wireless channels, the signals propagate in all directions. For the communication between Alice and Bob, an Eavesdropper can receive the signals from both Alice and Bob as far as the Eavesdropper is in the range determined by the transmitting power. Through phased array antenna with beam tracking circuits or cooperative iteration, the signals are confined near the straight line connecting the positions of Alice and Bob, so it will largely reduce the valid placement of an Eavesdropper. Sometimes, this reduction can be prohibitive for Eavesdropper to wiretap the channel since the reduced space can be readily protected. Two …


Evaluating Two Hands-On Tools For Teaching Local Area Network Vulnerabilities, Ariana Brown, Jinsheng Xu, Xiaohong Yuan Oct 2018

Evaluating Two Hands-On Tools For Teaching Local Area Network Vulnerabilities, Ariana Brown, Jinsheng Xu, Xiaohong Yuan

KSU Proceedings on Cybersecurity Education, Research and Practice

According to the Verizon’s Data Breach Investigations Report, Local Area Network (LAN) access is the top vector for insider threats and misuses. It is critical for students to learn these vulnerabilities, understand the mechanisms of exploits, and know the countermeasures. The department of Computer Science at North Carolina A&T State University designed two different educational tools that help students learn ARP Spoofing Attacks, which is the most popular attack on LAN. The first tool, called Hacker’s Graphical User Interface (HGUI), is a visualization tool that demonstrates ARP Spoofing Attack with real time animation. The second tool is a hands-on (HandsOn) …


Girls Who Code 3rd-5th, Khristina Polivanov Oct 2018

Girls Who Code 3rd-5th, Khristina Polivanov

Honors Expanded Learning Clubs

The goal of the club is to encourage girls to be confident in themselves and their abilities while teaching them basic concepts used in computer science.


Comparing Us And Russian Grading Scales, Olga Kosheleva, Vladik Kreinovich Oct 2018

Comparing Us And Russian Grading Scales, Olga Kosheleva, Vladik Kreinovich

Departmental Technical Reports (CS)

In the US, grades are usually based on comprehensive written exams: the larger the proportion of topic in which the student shows knowledge, the higher the student's grade. In contrast, in Russia, the grades are based on oral exams, and the bulk of the grade comes from a student answering questions of a few (usually, three) randomly selected topics. A natural question is: what is the relation between the two grading scales? It turns out that "excellent" and "good" grades means the same in both scales, while the US "satisfactory" level is higher than a similar Russian level.


Psychological Behavior Of English Learners Utilizing A Cognitive Tutor In An Online Pre-Calculus, Julian Viera Jr., Olga Kosheleva, Vladik Kreinovich Oct 2018

Psychological Behavior Of English Learners Utilizing A Cognitive Tutor In An Online Pre-Calculus, Julian Viera Jr., Olga Kosheleva, Vladik Kreinovich

Departmental Technical Reports (CS)

The educational landscape is becoming a digital learning environment. Students in today's digital world draw from multiple sources of information; from hypertext, videos, social media, to video games and internet searches. English Learners, individuals learning two languages at once, who use software written in English have a passive relationship with the computer when software is not in their native language. They feel that this educational software belongs to another culture. This paper will present findings from a study with English Learners' engagement in a fully online pre-calculus course. The authors utilized Cultural-Historical Activity Theory to describe how English Learners' created …


Ums Data Governance Annual Report 2018, University Of Maine System Data Advisory Committee Oct 2018

Ums Data Governance Annual Report 2018, University Of Maine System Data Advisory Committee

General University of Maine Publications

The newly formed University of Maine System Data Governance program was launched to improve the System's capacity to collect information and deploy resources in service to the students and in response to Maine's dire demographic and workforce challenges.

The UMS campuses and administrative units make up a complex system that requires a strategic approach to data collection and analysis. From understanding the intricacies of distance education and online programs, to aligning human resource and financial department codes, unified data governance is essential to ensuring the integrity and reliability of the University of Maine System's data.


Sufat: An Analytics Tool For Gaining Insights From Student Feedback Comments, Siddhant Pyasi, Swapna Gottipati, Venky Shankararaman Oct 2018

Sufat: An Analytics Tool For Gaining Insights From Student Feedback Comments, Siddhant Pyasi, Swapna Gottipati, Venky Shankararaman

Research Collection School Of Computing and Information Systems

Teacher evaluation is a vital element inimproving student learning outcomes. Course and instructor feedback given bystudents, provides insights that can help improve student learning outcomes andteaching quality. Teaching and course evaluation systems help to collectquantitative and qualitative feedback from students. Since manually analysingthe qualitative feedback is painstaking and a tedious process, usually, onlythe quantitative feedback is often used for evaluating the course and theinstructor. However, useful knowledge is hidden in the qualitative comments, inthe form of sentiments and suggestions that can provide valuable insights tohelp plan improvements in the course content and delivery. In order toefficiently gather, analyse and provide …


Exploring Experiential Learning Model And Risk Management Process For An Undergraduate Software Architecture Course, Eng Lieh Ouh, Yunghans Irawan Oct 2018

Exploring Experiential Learning Model And Risk Management Process For An Undergraduate Software Architecture Course, Eng Lieh Ouh, Yunghans Irawan

Research Collection School Of Computing and Information Systems

This paper shares our insights on exploring theexperiential learning model and risk management process todesign an undergraduate software architecture course. The keychallenge for undergraduate students to appreciate softwarearchitecture design is usually their limited experience in thesoftware industry. In software architecture, the high-level designprinciples are heuristics lacking the absoluteness of firstprinciples which for inexperienced undergraduate students, thisis a frustrating divergence from what they used to value. From aneducator's perspective, teaching software architecture requirescontending with the problem of how to express this level ofabstraction practically and also make the learning realistic. Inthis paper, we propose a model adapting the concepts ofexperiential learning …


Research Innovation And Institutional Growth: Digital Humanities, Usm, And The University Of Maine System, Janet M. Billson, Katherine Bessey Sep 2018

Research Innovation And Institutional Growth: Digital Humanities, Usm, And The University Of Maine System, Janet M. Billson, Katherine Bessey

Research Innovation and Institutional Growth

No abstract provided.


Teaching Basic Programming To Pre-University Students Through Blended Learning Pedagogy: A Descriptive Study, Vandana Ramachandra Rao, Ngee Mok Heng Sep 2018

Teaching Basic Programming To Pre-University Students Through Blended Learning Pedagogy: A Descriptive Study, Vandana Ramachandra Rao, Ngee Mok Heng

Research Collection School Of Computing and Information Systems

Students enrolling for undergraduate programmes in Singapore would have either finished their polytechnic diploma or completed Junior College (JC) studies. Most pre-university students coming through the JC pathway are not exposed to programming as computing is offered as a subject in a very few JCs. The authors of this paper conducted four runs of an introductory programing course between 2016 and 2017 for a research project funded by the Ministry of Education, Singapore. The project named “Let’s Code!” was intended to introduce fundamental programming concepts to students and guide them to consider taking a computer-science related degree for their university …


Transforming Learning With Information And Communication Technologies: Insights From Three Decades Of Research, Romina Jamieson-Proctor Aug 2018

Transforming Learning With Information And Communication Technologies: Insights From Three Decades Of Research, Romina Jamieson-Proctor

2009 - 2019 ACER Research Conferences

Since computers first appeared in classrooms, educators have sought to integrate information communication technologies (ICT) into teaching and learning. In Australia, as elsewhere, ICT are widely regarded as critical facilitators of student learning. The ability to use ICT effectively is specified in Australia’s national curriculum as a required general capability. However, despite the educational environment being replete with ICT related programs, our understanding of how students use ICT for learning is still limited. This paper presents insights from the past 30 years of research, which suggest that even though the current ‘climate’ in Australian schools is favourable, teacher confidence and …


An Examination Of Factors Correlating With Course Failure In A High School Computer Science Course, Steven Mcgee, Ronald I. Greenberg, Lucia Dettori, Andrew M. Rasmussen, Randi Mcgee-Tekula, Jennifer Duck, Erica Wheeler Aug 2018

An Examination Of Factors Correlating With Course Failure In A High School Computer Science Course, Steven Mcgee, Ronald I. Greenberg, Lucia Dettori, Andrew M. Rasmussen, Randi Mcgee-Tekula, Jennifer Duck, Erica Wheeler

Computer Science: Faculty Publications and Other Works

Across the United States, enrollment in high school computer science (CS) courses is increasing. These increases, however, are not spread evenly across race and gender. CS remains largely an elective class, and fewer than three-fourths of the states allow it to count towards graduation. The Chicago Public Schools has sought to ensure access for all students by recently enacting computer science as a high school graduation requirement. The primary class that fulfills the graduation requirement is Exploring Computer Science (ECS), a high school introductory course and professional development program designed to foster deep engagement through equitable inquiry around CS …


Visualization Of Geospatial Data As An Analytical And Educational Tool, Richard A. Vu Aug 2018

Visualization Of Geospatial Data As An Analytical And Educational Tool, Richard A. Vu

STAR Program Research Presentations

World Wind is an open-source API developed for Java, Android, and browsers that is designed to visualize and interact with geospatial data. The Web World Wind client is composed of four major components: the HTML template, the globe, geospatial features, and application features. The template was implemented using Bootstrap and hosts the globe provided by World Wind. This globe draws its data from multiple imagery sources, including the Open Geospatial Consortium (OGC) Web Map Service and Web Map Tile Service. This enables the application to perform and visualize complex calculations with multiple types of data such as weather and terrain. …