Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Taylor University (339)
- Singapore Management University (130)
- Selected Works (96)
- Kennesaw State University (69)
- Old Dominion University (50)
-
- Loyola University Chicago (45)
- Technological University Dublin (44)
- Nova Southeastern University (42)
- Purdue University (33)
- Walden University (28)
- University of Nevada, Las Vegas (26)
- University of Nebraska - Lincoln (25)
- Western Kentucky University (24)
- Sacred Heart University (23)
- University of Texas at El Paso (22)
- SelectedWorks (20)
- Ateneo de Manila University (19)
- The University of Maine (19)
- Zayed University (19)
- Georgia Southern University (18)
- University of South Florida (18)
- CCT College Dublin (15)
- Clemson University (14)
- Chapman University (13)
- City University of New York (CUNY) (13)
- Utah State University (13)
- California Polytechnic State University, San Luis Obispo (12)
- California State University, San Bernardino (11)
- DePaul University (11)
- Embry-Riddle Aeronautical University (11)
- Keyword
-
- Education (109)
- Computer science (59)
- Higher education (51)
- Computer science education (37)
- Cybersecurity (37)
-
- Machine learning (30)
- Programming (29)
- STEM (28)
- Educational technology (27)
- Artificial intelligence (24)
- Curriculum (22)
- Computer Science (21)
- Singapore (21)
- Technology (20)
- Computer Science Education (18)
- Undergraduate students (18)
- Mathematics (17)
- Western Kentucky University (17)
- Assessment (16)
- College seniors (16)
- Learning (16)
- Science projects (16)
- Engineering design, contest (15)
- Engineering, studying and teaching (15)
- Information technology (15)
- Pedagogy (15)
- Research Project (15)
- AI (14)
- Active learning (14)
- Exploring Computer Science (14)
- Publication Year
- Publication
-
- Research Collection School Of Computing and Information Systems (114)
- Computer Science: Faculty Publications and Other Works (44)
- CCE Theses and Dissertations (41)
- Journal of Cybersecurity Education, Research and Practice (36)
- ACMS Conference Proceedings 2013 (30)
-
- Walden Dissertations and Doctoral Studies (28)
- ACMS Conference Proceedings 2011 (26)
- ACMS Conference Proceedings 2019 (26)
- ACMS Conference Proceedings 2015 (23)
- ACMS Conference Proceedings 2017 (22)
- Articles (22)
- ACMS Conference Proceedings 2005 (20)
- ACMS Conference Proceedings 2009 (20)
- Departmental Technical Reports (CS) (20)
- All Works (19)
- ACMS Conference Proceedings 2007 (18)
- Theses and Dissertations (18)
- ACMS Conference Proceedings 2003 (17)
- Fred and Harriet Cox Senior Design Competition Projects (17)
- School of Computer Science & Engineering Faculty Publications (17)
- WKU Archives Records (16)
- ACMS Conference Proceedings 1997 (15)
- Computer Science Faculty Publications (15)
- ICT (15)
- ACMS Conference Proceedings 2001 (14)
- General University of Maine Publications (14)
- Open Access Theses (14)
- ACMS Conference Proceedings 1977 (13)
- ACMS Conference Proceedings 1999 (13)
- Department of Information Systems & Computer Science Faculty Publications (13)
- Publication Type
Articles 1 - 30 of 1608
Full-Text Articles in Education
Factors Influencing The Perceptions Of Human-Computer Interaction Curriculum Developers In Higher Education Institutions During Curriculum Design And Delivery, Cynthia Augustine, Salah Kabanda
Factors Influencing The Perceptions Of Human-Computer Interaction Curriculum Developers In Higher Education Institutions During Curriculum Design And Delivery, Cynthia Augustine, Salah Kabanda
The African Journal of Information Systems
Computer science (CS) and information systems students seeking to work as software developers upon graduating are often required to create software that has a sound user experience (UX) and meets the needs of its users. This includes addressing unique user, context, and infrastructural requirements. This study sought to identify the factors that influence the perceptions of human-computer interaction (HCI) curriculum developers in higher education institutions (HEIs) in developing economies of Africa when it comes to curriculum design and delivery. A qualitative enquiry was conducted and consisted of fourteen interviews with HCI curriculum developers and UX practitioners in four African countries. …
Hgs-3 The Influence Of A Tandem Cycling Program In The Community On Physical And Functional Health, Therapeutic Bonds, And Quality Of Life For Individuals And Care Partners Coping With Parkinson’S Disease, Leila Djerdjour, Jennifer L. Trilk
Hgs-3 The Influence Of A Tandem Cycling Program In The Community On Physical And Functional Health, Therapeutic Bonds, And Quality Of Life For Individuals And Care Partners Coping With Parkinson’S Disease, Leila Djerdjour, Jennifer L. Trilk
SC Upstate Research Symposium
Purpose Statement: Several studies have shown that aerobic exercise can have a positive impact on alleviating symptoms experienced by individuals with Parkinson's disease (PD). Despite this evidence, the potential benefits of exercise for both PD patients and their care partners (PD dyad) remain unexplored. This research project investigates the effectiveness, therapeutic collaborations, and physical outcomes of a virtual reality (VR) tandem cycling program specifically designed for PD dyads.
Methods: Following approval from the Prisma Health Institutional Review Board, individuals with PD were identified and screened by clinical neurologists. The pre-testing measures for PD dyads (N=9) included emotional and cognitive status …
Immersive Japanese Language Learning Web Application Using Spaced Repetition, Active Recall, And An Artificial Intelligent Conversational Chat Agent Both In Voice And In Text, Marc Butler
MS in Computer Science Project Reports
In the last two decades various human language learning applications, spaced repetition software, online dictionaries, and artificial intelligent chat agents have been developed. However, there is no solution to cohesively combine these technologies into a comprehensive language learning application including skills such as speaking, typing, listening, and reading. Our contribution is to provide an immersive language learning web application to the end user which combines spaced repetition, a study technique used to review information at systematic intervals, and active recall, the process of purposely retrieving information from memory during a review session, with an artificial intelligent conversational chat agent both …
What Students Have To Say On Data Privacy For Educational Technology, Stephanie Choi
What Students Have To Say On Data Privacy For Educational Technology, Stephanie Choi
Cybersecurity Undergraduate Research Showcase
The literature on data privacy in terms of educational technology is a growing area of study. The perspective of educators has been captured extensively. However, the literature on students’ perspectives is missing, which is what we explore in this paper. We use a pragmatic qualitative approach with an experiential lens to capture students’ attitudes towards data privacy in terms of educational technology. We identified preliminary, common themes that appeared in the survey responses. The paper concludes by calling for more research on how students perceive data privacy in terms of educational technology.
The Security Of Deep Neural Networks, Jalaya Allen
The Security Of Deep Neural Networks, Jalaya Allen
Cybersecurity Undergraduate Research Showcase
Our society has transitioned from our primitive lifestyle to soon, an increasingly automatic one. That idea is further exemplified as we shift into an AI era, better known as Artificial intelligence. Artificial Intelligence is classified as computer systems that can perform tasks that typically require human intelligence. However, a common thought or question that most might have is, how is this done? How does AI process information the way we want it to and have access to so much information? AI is trained by systems called AI models. These modeling programs are trained on data to recognize patterns or make …
Comparing Cognitive Theories Of Learning Transfer To Advance Cybersecurity Instruction, Assessment, And Testing, Daniel T. Hickey Ph.D., Ronald J. Kantor
Comparing Cognitive Theories Of Learning Transfer To Advance Cybersecurity Instruction, Assessment, And Testing, Daniel T. Hickey Ph.D., Ronald J. Kantor
Journal of Cybersecurity Education, Research and Practice
The cybersecurity threat landscape evolves quickly, continually, and consequentially. This means that the transfer of cybersecurity learning is crucial. We compared how different recognized “cognitive” transfer theories might help explain and synergize three aspects of cybersecurity education. These include teaching and training in diverse settings, assessing learning formatively & summatively, and testing & measuring achievement, proficiency, & readiness. We excluded newer sociocultural theories and their implications for inclusion as we explore those theories elsewhere. We first summarized the history of cybersecurity education and proficiency standards considering transfer theories. We then explored each theory and reviewed the most relevant cybersecurity education …
Exploring Practical Measures As An Approach For Measuring Elementary Students’ Attitudes Towards Computer Science, Umar Shehzad, Mimi M. Recker, Jody E. Clarke-Midura
Exploring Practical Measures As An Approach For Measuring Elementary Students’ Attitudes Towards Computer Science, Umar Shehzad, Mimi M. Recker, Jody E. Clarke-Midura
Publications
This paper presents a novel approach for predicting the outcomes of elementary students’ participation in computer science (CS) instruction by using exit tickets, a type of practical measure, where students provide rapid feedback on their instructional experiences. Such feedback can help teachers to inform ongoing teaching and instructional practices. We fit a Structural Equation Model to examine whether students' perceptions of enjoyment, ease, and connections between mathematics and CS in an integrated lesson predicted their affective outcomes in self-efficacy, interest, and CS identity, collected in a pre- post- survey. We found that practical measures can validly measure student experiences.
Navigating The Maze: The Role Of Pre-Enrollment Socio-Cultural And Institutional Factors In Higher Education In The Age Of Ai, Emily Barnes, James Hutson
Navigating The Maze: The Role Of Pre-Enrollment Socio-Cultural And Institutional Factors In Higher Education In The Age Of Ai, Emily Barnes, James Hutson
Faculty Scholarship
This article explores the complex interplay between pre-enrollment socio-cultural and institutional factors and their impact on the higher education landscape. It challenges traditional metrics of academic achievement, presenting a nuanced perspective on student success that emphasizes the importance of socio-economic backgrounds, cultural capital, and K-12 education quality. The analysis extends to the significant role of institutional attributes in shaping student readiness and decision-making processes. The study advocates for the integration of artificial intelligence (AI)-driven assessments by higher education institutions to cater to the diverse needs of the student body, promoting an inclusive and supportive learning environment. Anchored in an extensive …
Improving Educational Delivery And Content In Juvenile Detention Centers, Yomna Elmousalami
Improving Educational Delivery And Content In Juvenile Detention Centers, Yomna Elmousalami
Undergraduate Research Symposium
Students in juvenile detention centers have the greatest need to receive improvements in educational delivery and content; however, they are one of the “truly disadvantaged” populations in terms of receiving those improvements. This work presents a qualitative data analysis based on a focus group meeting with stakeholders at a local Juvenile Detention Center. The current educational system in juvenile detention centers is based on paper worksheets, single-room style teaching methods, outdated technology, and a shortage of textbooks and teachers. In addition, detained students typically have behavioral challenges that are deemed "undesired" in society. As a result, many students miss classes …
An Analysis And Ontology Of Teaching Methods In Cybersecurity Education, Sarah Buckley
An Analysis And Ontology Of Teaching Methods In Cybersecurity Education, Sarah Buckley
LSU Master's Theses
The growing cybersecurity workforce gap underscores the urgent need to address deficiencies in cybersecurity education: the current education system is not producing competent cybersecurity professionals, and current efforts are not informing the non-technical general public of basic cybersecurity practices. We argue that this gap is compounded by a fundamental disconnect between cybersecurity education literature and established education theory. Our research addresses this issue by examining the alignment of cybersecurity education literature concerning educational methods and tools with education literature.
In our research, we endeavor to bridge this gap by critically analyzing the alignment of cybersecurity education literature with education theory. …
Preprocessing Of Astronomical Images From The Neowise Survey For Near-Earth Asteroid Detection With Machine Learning, Rachel Meyer
Preprocessing Of Astronomical Images From The Neowise Survey For Near-Earth Asteroid Detection With Machine Learning, Rachel Meyer
ELAIA
Asteroid detection is a common field in astronomy for planetary defense, requiring observations from survey telescopes to detect and classify different objects. The amount of data collected each night is continually increasing as new and better-designed telescopes begin collecting information each year. This amount of data is quickly becoming unmanageable, and researchers are looking for ways to better process this data. The most feasible current solution is to implement computer algorithms to automatically detect these sources and then use machine learning to create a more efficient and accurate method of classification. Implementation of such methods has previously focused on larger …
A Study On Ethical Hacking In Cybersecurity Education Within The United States, Jordan Chew
A Study On Ethical Hacking In Cybersecurity Education Within The United States, Jordan Chew
Master's Theses
As the field of computer security continues to grow, it becomes increasingly important to educate the next generation of security professionals. However, much of the current education landscape primarily focuses on teaching defensive skills. Teaching offensive security, otherwise known as ethical hacking, is an important component in the education of all students who hope to contribute to the field of cybersecurity. Doing so requires a careful consideration of what ethical, legal, and practical issues arise from teaching students skills that can be used to cause harm. In this thesis, we first examine the current state of cybersecurity education in the …
Hearing Iterative And Recursive Behavior: Sonification Improves Student Understanding, Joel C. Adams, Hayworth Anderson
Hearing Iterative And Recursive Behavior: Sonification Improves Student Understanding, Joel C. Adams, Hayworth Anderson
University Faculty Publications and Creative Works
Abstract topics such as recursion are challenging for many computer science students to understand. In this experience report, we explore function sonification-the addition of sound to a function to communicate information about the function's behavior in real-time as it runs-as a pedagogical approach for improving students' understanding of recursion. We present several example iterative and recursive function sonifications, plus spectrograms that illustrate their different sonic behaviors. We also present experimental evidence that using these sonifications significantly improved the understanding of recursion for students who used them, compared to students who used silent (i.e., traditional) versions of the same functions. Based …
Improving Belonging And Connectedness In The Cybersecurity Workforce: From College To The Profession, Mary Beth Klinger
Improving Belonging And Connectedness In The Cybersecurity Workforce: From College To The Profession, Mary Beth Klinger
Journal of Cybersecurity Education, Research and Practice
This article explores the results of a project aimed at supporting community college students in their academic pursuit of an Associate of Applied Science (AAS) degree in Cybersecurity through mentorship, collaboration, skill preparation, and other activities and touch points to increase students’ sense of belonging and connectedness in the cybersecurity profession. The goal of the project was focused on developing diverse, educated, and skilled cybersecurity personnel for employment within local industry and government to help curtail the current regional cybersecurity workforce gap that is emblematic of the lack of qualified cybersecurity personnel that presently exists nationwide. Emphasis throughout the project …
University Of Johannesburg Institutional Repository Cybersecurity Output: 2015-2021 Interdisciplinary Study, Mancha J. Sekgololo
University Of Johannesburg Institutional Repository Cybersecurity Output: 2015-2021 Interdisciplinary Study, Mancha J. Sekgololo
Journal of Cybersecurity Education, Research and Practice
This study examines cybersecurity awareness in universities by analyzing related research output across different disciplines at the University of Johannesburg. The diffusion of innovation theory is used in this study as a theoretical framework to explain how cybersecurity awareness diffuses across disciplines. The University of Johannesburg Institutional Repository database was the data source for this study. Variations in cybersecurity keyword searches and topic modeling techniques were used to identify the frequency and distribution of research output across different disciplines. The study reveals that cybersecurity awareness has diffused across various disciplines, including non-computer science disciplines such as business, accounting, and social …
Developing A Success Model Of A Social Student Relationship Management System, Wasef Mater, Monther Aldwairi, Nasim Matar, Waleed Al-Rahmi
Developing A Success Model Of A Social Student Relationship Management System, Wasef Mater, Monther Aldwairi, Nasim Matar, Waleed Al-Rahmi
All Works
Social media's significance in higher education has increased due to its capacity to enhance participation, communication, teamwork, and information sharing. Important notifications, updates, and reminders can be promptly received by all members of the university community, assuring that information is shared with everyone. The objective of this study is to develop a model for a Customer Relationship Management (CRM) system in higher education that is based on social media and intends to increase student satisfaction, loyalty, and profitability. It blends the idea of trust with Delone Mclean success model. Partial Least Squares-Structural Equation Modeling (PLS-SEM) was used to evaluate the …
Digitizing Delphi: Educating Audiences Through Virtual Reconstruction, Kate Koury
Digitizing Delphi: Educating Audiences Through Virtual Reconstruction, Kate Koury
The Journal of Purdue Undergraduate Research
Implementing a 3D model into a virtual space allows the general public to engage critically with archaeological processes. There are many unseen decisions that go into reconstructing an ancient temple. Analysis of available materials and techniques, predictions of how objects were used, decisions of what sources to reference, puzzle piecing broken remains together, and even educated guesses used to fill gaps in information often go unobserved by the public. This work will educate users about those choices by allowing the side-by-side comparison of conflicting theories on the reconstruction of the Tholos at Delphi, which is an ideal site because of …
Advancing Cognitive Accessibility: The Role Of Artificial Intelligence In Enhancing Inclusivity, Rukiya Deetjen-Ruiz, Marjorie P Daniel, Jennie Telus, Lodz Deetjen
Advancing Cognitive Accessibility: The Role Of Artificial Intelligence In Enhancing Inclusivity, Rukiya Deetjen-Ruiz, Marjorie P Daniel, Jennie Telus, Lodz Deetjen
All Works
This editorial examines the transformative role of Artificial Intelligence (AI) in enhancing cognitive accessibility for neurodiverse individuals. It explores the evolution from conventional assistive technologies to sophisticated AI-driven solutions, highlighting how these advancements are reshaping inclusivity in education and the workplace. The piece critically analyzes the benefits and challenges of AI in this context, considering ethical implications, user-centered design, and the need for equitable access. It concludes with a call to action for continued innovation and collaboration in developing AI technologies that truly cater to the diverse needs of neurodiverse individuals.
Crack-Ers (Crack Riddles Applying Cybersecurity Knowledge - Escape Room Scenario), Benjamin Acuff
Crack-Ers (Crack Riddles Applying Cybersecurity Knowledge - Escape Room Scenario), Benjamin Acuff
Posters-at-the-Capitol
CRACK-ERS (Crack Riddles Applying Cybersecurity Knowledge - Escape Room Scenario) is a unique, beginner's level CTF game with riddle-based challenges on various cybersecurity topics. The game is driven by an adventure story-based escape room format. Existing literature indicates that traditional CTFs pose challenges for beginners with no cybersecurity background. The novelty of CRACK-ERS lies in its non-traditional design as an unplugged CTF with an adventure scenario-driven script, encouraging participants to solve cybersecurity-related riddles. CRACK-ERS targets beginner-level learners, fostering teamwork, explorative research, cybersecurity problem-solving, and riddle-cracking skills. Prior cybersecurity educational research notes limited instances of escape room-style CTF games and fewer …
Hiccups And Hallucinations: Critically Engaging Ai In The Design Classroom, Drew Sisk
Hiccups And Hallucinations: Critically Engaging Ai In The Design Classroom, Drew Sisk
Clemson Teaching Excellence Conference 2024: Teaching in the Age of AI
No abstract provided.
Ghostwriter To Co-Author: Helping Students Leverage Ai In The Classroom, Ishani Banerji
Ghostwriter To Co-Author: Helping Students Leverage Ai In The Classroom, Ishani Banerji
Clemson Teaching Excellence Conference 2024: Teaching in the Age of AI
No abstract provided.
Navigating Anxiety And Activity: Generative Ai And Writing Support, Chelsea J. Murdock
Navigating Anxiety And Activity: Generative Ai And Writing Support, Chelsea J. Murdock
Clemson Teaching Excellence Conference 2024: Teaching in the Age of AI
No abstract provided.
Academic Ethics In Ai-Assisted Writing: A Writing Center-Informed Approach, John Falter
Academic Ethics In Ai-Assisted Writing: A Writing Center-Informed Approach, John Falter
Clemson Teaching Excellence Conference 2024: Teaching in the Age of AI
No abstract provided.
Using Generative Artificial Intelligence For Engaged Student Learning, Janice G. Lanham, Charlotte Branyon
Using Generative Artificial Intelligence For Engaged Student Learning, Janice G. Lanham, Charlotte Branyon
Clemson Teaching Excellence Conference 2024: Teaching in the Age of AI
No abstract provided.
The Use And Misuse Of Generative Ai For Photos And Imagery, Erica B. Walker
The Use And Misuse Of Generative Ai For Photos And Imagery, Erica B. Walker
Clemson Teaching Excellence Conference 2024: Teaching in the Age of AI
No abstract provided.
Requiring Students To Integrate Chatgptinto Course Assignments, Mark Small, Venera Balidemaj
Requiring Students To Integrate Chatgptinto Course Assignments, Mark Small, Venera Balidemaj
Clemson Teaching Excellence Conference 2024: Teaching in the Age of AI
No abstract provided.
Ai-Enhanced Education: Fostering Creativity, Efficiency, And Future-Ready Skills, Rodger Eugene Bishop
Ai-Enhanced Education: Fostering Creativity, Efficiency, And Future-Ready Skills, Rodger Eugene Bishop
Clemson Teaching Excellence Conference 2024: Teaching in the Age of AI
No abstract provided.
Using Ai In The Teacher Preparation Programs And Social Studies Classrooms, Brandon Beck
Using Ai In The Teacher Preparation Programs And Social Studies Classrooms, Brandon Beck
Clemson Teaching Excellence Conference 2024: Teaching in the Age of AI
No abstract provided.
Language Portraits: A Space To Explore Identities In A Graduate Course, Hazel Vega
Language Portraits: A Space To Explore Identities In A Graduate Course, Hazel Vega
Clemson Teaching Excellence Conference 2024: Teaching in the Age of AI
No abstract provided.
Critical Ai Engagement: Crafting Assignments That Encourage Productive Engagement With Ai, Carl Ehrett
Critical Ai Engagement: Crafting Assignments That Encourage Productive Engagement With Ai, Carl Ehrett
Clemson Teaching Excellence Conference 2024: Teaching in the Age of AI
No abstract provided.