Open Access. Powered by Scholars. Published by Universities.®

Education Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 1608

Full-Text Articles in Education

Factors Influencing The Perceptions Of Human-Computer Interaction Curriculum Developers In Higher Education Institutions During Curriculum Design And Delivery, Cynthia Augustine, Salah Kabanda Apr 2024

Factors Influencing The Perceptions Of Human-Computer Interaction Curriculum Developers In Higher Education Institutions During Curriculum Design And Delivery, Cynthia Augustine, Salah Kabanda

The African Journal of Information Systems

Computer science (CS) and information systems students seeking to work as software developers upon graduating are often required to create software that has a sound user experience (UX) and meets the needs of its users. This includes addressing unique user, context, and infrastructural requirements. This study sought to identify the factors that influence the perceptions of human-computer interaction (HCI) curriculum developers in higher education institutions (HEIs) in developing economies of Africa when it comes to curriculum design and delivery. A qualitative enquiry was conducted and consisted of fourteen interviews with HCI curriculum developers and UX practitioners in four African countries. …


Hgs-3 The Influence Of A Tandem Cycling Program In The Community On Physical And Functional Health, Therapeutic Bonds, And Quality Of Life For Individuals And Care Partners Coping With Parkinson’S Disease, Leila Djerdjour, Jennifer L. Trilk Apr 2024

Hgs-3 The Influence Of A Tandem Cycling Program In The Community On Physical And Functional Health, Therapeutic Bonds, And Quality Of Life For Individuals And Care Partners Coping With Parkinson’S Disease, Leila Djerdjour, Jennifer L. Trilk

SC Upstate Research Symposium

Purpose Statement: Several studies have shown that aerobic exercise can have a positive impact on alleviating symptoms experienced by individuals with Parkinson's disease (PD). Despite this evidence, the potential benefits of exercise for both PD patients and their care partners (PD dyad) remain unexplored. This research project investigates the effectiveness, therapeutic collaborations, and physical outcomes of a virtual reality (VR) tandem cycling program specifically designed for PD dyads.

Methods: Following approval from the Prisma Health Institutional Review Board, individuals with PD were identified and screened by clinical neurologists. The pre-testing measures for PD dyads (N=9) included emotional and cognitive status …


Immersive Japanese Language Learning Web Application Using Spaced Repetition, Active Recall, And An Artificial Intelligent Conversational Chat Agent Both In Voice And In Text, Marc Butler Apr 2024

Immersive Japanese Language Learning Web Application Using Spaced Repetition, Active Recall, And An Artificial Intelligent Conversational Chat Agent Both In Voice And In Text, Marc Butler

MS in Computer Science Project Reports

In the last two decades various human language learning applications, spaced repetition software, online dictionaries, and artificial intelligent chat agents have been developed. However, there is no solution to cohesively combine these technologies into a comprehensive language learning application including skills such as speaking, typing, listening, and reading. Our contribution is to provide an immersive language learning web application to the end user which combines spaced repetition, a study technique used to review information at systematic intervals, and active recall, the process of purposely retrieving information from memory during a review session, with an artificial intelligent conversational chat agent both …


What Students Have To Say On Data Privacy For Educational Technology, Stephanie Choi Apr 2024

What Students Have To Say On Data Privacy For Educational Technology, Stephanie Choi

Cybersecurity Undergraduate Research Showcase

The literature on data privacy in terms of educational technology is a growing area of study. The perspective of educators has been captured extensively. However, the literature on students’ perspectives is missing, which is what we explore in this paper. We use a pragmatic qualitative approach with an experiential lens to capture students’ attitudes towards data privacy in terms of educational technology. We identified preliminary, common themes that appeared in the survey responses. The paper concludes by calling for more research on how students perceive data privacy in terms of educational technology.


The Security Of Deep Neural Networks, Jalaya Allen Apr 2024

The Security Of Deep Neural Networks, Jalaya Allen

Cybersecurity Undergraduate Research Showcase

Our society has transitioned from our primitive lifestyle to soon, an increasingly automatic one. That idea is further exemplified as we shift into an AI era, better known as Artificial intelligence. Artificial Intelligence is classified as computer systems that can perform tasks that typically require human intelligence. However, a common thought or question that most might have is, how is this done? How does AI process information the way we want it to and have access to so much information? AI is trained by systems called AI models. These modeling programs are trained on data to recognize patterns or make …


Comparing Cognitive Theories Of Learning Transfer To Advance Cybersecurity Instruction, Assessment, And Testing, Daniel T. Hickey Ph.D., Ronald J. Kantor Apr 2024

Comparing Cognitive Theories Of Learning Transfer To Advance Cybersecurity Instruction, Assessment, And Testing, Daniel T. Hickey Ph.D., Ronald J. Kantor

Journal of Cybersecurity Education, Research and Practice

The cybersecurity threat landscape evolves quickly, continually, and consequentially. This means that the transfer of cybersecurity learning is crucial. We compared how different recognized “cognitive” transfer theories might help explain and synergize three aspects of cybersecurity education. These include teaching and training in diverse settings, assessing learning formatively & summatively, and testing & measuring achievement, proficiency, & readiness. We excluded newer sociocultural theories and their implications for inclusion as we explore those theories elsewhere. We first summarized the history of cybersecurity education and proficiency standards considering transfer theories. We then explored each theory and reviewed the most relevant cybersecurity education …


Exploring Practical Measures As An Approach For Measuring Elementary Students’ Attitudes Towards Computer Science, Umar Shehzad, Mimi M. Recker, Jody E. Clarke-Midura Apr 2024

Exploring Practical Measures As An Approach For Measuring Elementary Students’ Attitudes Towards Computer Science, Umar Shehzad, Mimi M. Recker, Jody E. Clarke-Midura

Publications

This paper presents a novel approach for predicting the outcomes of elementary students’ participation in computer science (CS) instruction by using exit tickets, a type of practical measure, where students provide rapid feedback on their instructional experiences. Such feedback can help teachers to inform ongoing teaching and instructional practices. We fit a Structural Equation Model to examine whether students' perceptions of enjoyment, ease, and connections between mathematics and CS in an integrated lesson predicted their affective outcomes in self-efficacy, interest, and CS identity, collected in a pre- post- survey. We found that practical measures can validly measure student experiences.


Navigating The Maze: The Role Of Pre-Enrollment Socio-Cultural And Institutional Factors In Higher Education In The Age Of Ai, Emily Barnes, James Hutson Apr 2024

Navigating The Maze: The Role Of Pre-Enrollment Socio-Cultural And Institutional Factors In Higher Education In The Age Of Ai, Emily Barnes, James Hutson

Faculty Scholarship

This article explores the complex interplay between pre-enrollment socio-cultural and institutional factors and their impact on the higher education landscape. It challenges traditional metrics of academic achievement, presenting a nuanced perspective on student success that emphasizes the importance of socio-economic backgrounds, cultural capital, and K-12 education quality. The analysis extends to the significant role of institutional attributes in shaping student readiness and decision-making processes. The study advocates for the integration of artificial intelligence (AI)-driven assessments by higher education institutions to cater to the diverse needs of the student body, promoting an inclusive and supportive learning environment. Anchored in an extensive …


Improving Educational Delivery And Content In Juvenile Detention Centers, Yomna Elmousalami Mar 2024

Improving Educational Delivery And Content In Juvenile Detention Centers, Yomna Elmousalami

Undergraduate Research Symposium

Students in juvenile detention centers have the greatest need to receive improvements in educational delivery and content; however, they are one of the “truly disadvantaged” populations in terms of receiving those improvements. This work presents a qualitative data analysis based on a focus group meeting with stakeholders at a local Juvenile Detention Center. The current educational system in juvenile detention centers is based on paper worksheets, single-room style teaching methods, outdated technology, and a shortage of textbooks and teachers. In addition, detained students typically have behavioral challenges that are deemed "undesired" in society. As a result, many students miss classes …


An Analysis And Ontology Of Teaching Methods In Cybersecurity Education, Sarah Buckley Mar 2024

An Analysis And Ontology Of Teaching Methods In Cybersecurity Education, Sarah Buckley

LSU Master's Theses

The growing cybersecurity workforce gap underscores the urgent need to address deficiencies in cybersecurity education: the current education system is not producing competent cybersecurity professionals, and current efforts are not informing the non-technical general public of basic cybersecurity practices. We argue that this gap is compounded by a fundamental disconnect between cybersecurity education literature and established education theory. Our research addresses this issue by examining the alignment of cybersecurity education literature concerning educational methods and tools with education literature.

In our research, we endeavor to bridge this gap by critically analyzing the alignment of cybersecurity education literature with education theory. …


Preprocessing Of Astronomical Images From The Neowise Survey For Near-Earth Asteroid Detection With Machine Learning, Rachel Meyer Mar 2024

Preprocessing Of Astronomical Images From The Neowise Survey For Near-Earth Asteroid Detection With Machine Learning, Rachel Meyer

ELAIA

Asteroid detection is a common field in astronomy for planetary defense, requiring observations from survey telescopes to detect and classify different objects. The amount of data collected each night is continually increasing as new and better-designed telescopes begin collecting information each year. This amount of data is quickly becoming unmanageable, and researchers are looking for ways to better process this data. The most feasible current solution is to implement computer algorithms to automatically detect these sources and then use machine learning to create a more efficient and accurate method of classification. Implementation of such methods has previously focused on larger …


A Study On Ethical Hacking In Cybersecurity Education Within The United States, Jordan Chew Mar 2024

A Study On Ethical Hacking In Cybersecurity Education Within The United States, Jordan Chew

Master's Theses

As the field of computer security continues to grow, it becomes increasingly important to educate the next generation of security professionals. However, much of the current education landscape primarily focuses on teaching defensive skills. Teaching offensive security, otherwise known as ethical hacking, is an important component in the education of all students who hope to contribute to the field of cybersecurity. Doing so requires a careful consideration of what ethical, legal, and practical issues arise from teaching students skills that can be used to cause harm. In this thesis, we first examine the current state of cybersecurity education in the …


Hearing Iterative And Recursive Behavior: Sonification Improves Student Understanding, Joel C. Adams, Hayworth Anderson Mar 2024

Hearing Iterative And Recursive Behavior: Sonification Improves Student Understanding, Joel C. Adams, Hayworth Anderson

University Faculty Publications and Creative Works

Abstract topics such as recursion are challenging for many computer science students to understand. In this experience report, we explore function sonification-the addition of sound to a function to communicate information about the function's behavior in real-time as it runs-as a pedagogical approach for improving students' understanding of recursion. We present several example iterative and recursive function sonifications, plus spectrograms that illustrate their different sonic behaviors. We also present experimental evidence that using these sonifications significantly improved the understanding of recursion for students who used them, compared to students who used silent (i.e., traditional) versions of the same functions. Based …


Improving Belonging And Connectedness In The Cybersecurity Workforce: From College To The Profession, Mary Beth Klinger Feb 2024

Improving Belonging And Connectedness In The Cybersecurity Workforce: From College To The Profession, Mary Beth Klinger

Journal of Cybersecurity Education, Research and Practice

This article explores the results of a project aimed at supporting community college students in their academic pursuit of an Associate of Applied Science (AAS) degree in Cybersecurity through mentorship, collaboration, skill preparation, and other activities and touch points to increase students’ sense of belonging and connectedness in the cybersecurity profession. The goal of the project was focused on developing diverse, educated, and skilled cybersecurity personnel for employment within local industry and government to help curtail the current regional cybersecurity workforce gap that is emblematic of the lack of qualified cybersecurity personnel that presently exists nationwide. Emphasis throughout the project …


University Of Johannesburg Institutional Repository Cybersecurity Output: 2015-2021 Interdisciplinary Study, Mancha J. Sekgololo Feb 2024

University Of Johannesburg Institutional Repository Cybersecurity Output: 2015-2021 Interdisciplinary Study, Mancha J. Sekgololo

Journal of Cybersecurity Education, Research and Practice

This study examines cybersecurity awareness in universities by analyzing related research output across different disciplines at the University of Johannesburg. The diffusion of innovation theory is used in this study as a theoretical framework to explain how cybersecurity awareness diffuses across disciplines. The University of Johannesburg Institutional Repository database was the data source for this study. Variations in cybersecurity keyword searches and topic modeling techniques were used to identify the frequency and distribution of research output across different disciplines. The study reveals that cybersecurity awareness has diffused across various disciplines, including non-computer science disciplines such as business, accounting, and social …


Developing A Success Model Of A Social Student Relationship Management System, Wasef Mater, Monther Aldwairi, Nasim Matar, Waleed Al-Rahmi Feb 2024

Developing A Success Model Of A Social Student Relationship Management System, Wasef Mater, Monther Aldwairi, Nasim Matar, Waleed Al-Rahmi

All Works

Social media's significance in higher education has increased due to its capacity to enhance participation, communication, teamwork, and information sharing. Important notifications, updates, and reminders can be promptly received by all members of the university community, assuring that information is shared with everyone. The objective of this study is to develop a model for a Customer Relationship Management (CRM) system in higher education that is based on social media and intends to increase student satisfaction, loyalty, and profitability. It blends the idea of trust with Delone Mclean success model. Partial Least Squares-Structural Equation Modeling (PLS-SEM) was used to evaluate the …


Digitizing Delphi: Educating Audiences Through Virtual Reconstruction, Kate Koury Jan 2024

Digitizing Delphi: Educating Audiences Through Virtual Reconstruction, Kate Koury

The Journal of Purdue Undergraduate Research

Implementing a 3D model into a virtual space allows the general public to engage critically with archaeological processes. There are many unseen decisions that go into reconstructing an ancient temple. Analysis of available materials and techniques, predictions of how objects were used, decisions of what sources to reference, puzzle piecing broken remains together, and even educated guesses used to fill gaps in information often go unobserved by the public. This work will educate users about those choices by allowing the side-by-side comparison of conflicting theories on the reconstruction of the Tholos at Delphi, which is an ideal site because of …


Advancing Cognitive Accessibility: The Role Of Artificial Intelligence In Enhancing Inclusivity, Rukiya Deetjen-Ruiz, Marjorie P Daniel, Jennie Telus, Lodz Deetjen Jan 2024

Advancing Cognitive Accessibility: The Role Of Artificial Intelligence In Enhancing Inclusivity, Rukiya Deetjen-Ruiz, Marjorie P Daniel, Jennie Telus, Lodz Deetjen

All Works

This editorial examines the transformative role of Artificial Intelligence (AI) in enhancing cognitive accessibility for neurodiverse individuals. It explores the evolution from conventional assistive technologies to sophisticated AI-driven solutions, highlighting how these advancements are reshaping inclusivity in education and the workplace. The piece critically analyzes the benefits and challenges of AI in this context, considering ethical implications, user-centered design, and the need for equitable access. It concludes with a call to action for continued innovation and collaboration in developing AI technologies that truly cater to the diverse needs of neurodiverse individuals.


Crack-Ers (Crack Riddles Applying Cybersecurity Knowledge - Escape Room Scenario), Benjamin Acuff Jan 2024

Crack-Ers (Crack Riddles Applying Cybersecurity Knowledge - Escape Room Scenario), Benjamin Acuff

Posters-at-the-Capitol

CRACK-ERS (Crack Riddles Applying Cybersecurity Knowledge - Escape Room Scenario) is a unique, beginner's level CTF game with riddle-based challenges on various cybersecurity topics. The game is driven by an adventure story-based escape room format. Existing literature indicates that traditional CTFs pose challenges for beginners with no cybersecurity background. The novelty of CRACK-ERS lies in its non-traditional design as an unplugged CTF with an adventure scenario-driven script, encouraging participants to solve cybersecurity-related riddles. CRACK-ERS targets beginner-level learners, fostering teamwork, explorative research, cybersecurity problem-solving, and riddle-cracking skills. Prior cybersecurity educational research notes limited instances of escape room-style CTF games and fewer …


Hiccups And Hallucinations: Critically Engaging Ai In The Design Classroom, Drew Sisk Jan 2024

Hiccups And Hallucinations: Critically Engaging Ai In The Design Classroom, Drew Sisk

Clemson Teaching Excellence Conference 2024: Teaching in the Age of AI

No abstract provided.


Ghostwriter To Co-Author: Helping Students Leverage Ai In The Classroom, Ishani Banerji Jan 2024

Ghostwriter To Co-Author: Helping Students Leverage Ai In The Classroom, Ishani Banerji

Clemson Teaching Excellence Conference 2024: Teaching in the Age of AI

No abstract provided.


Navigating Anxiety And Activity: Generative Ai And Writing Support, Chelsea J. Murdock Jan 2024

Navigating Anxiety And Activity: Generative Ai And Writing Support, Chelsea J. Murdock

Clemson Teaching Excellence Conference 2024: Teaching in the Age of AI

No abstract provided.


Academic Ethics In Ai-Assisted Writing: A Writing Center-Informed Approach, John Falter Jan 2024

Academic Ethics In Ai-Assisted Writing: A Writing Center-Informed Approach, John Falter

Clemson Teaching Excellence Conference 2024: Teaching in the Age of AI

No abstract provided.


Using Generative Artificial Intelligence For Engaged Student Learning, Janice G. Lanham, Charlotte Branyon Jan 2024

Using Generative Artificial Intelligence For Engaged Student Learning, Janice G. Lanham, Charlotte Branyon

Clemson Teaching Excellence Conference 2024: Teaching in the Age of AI

No abstract provided.


The Use And Misuse Of Generative Ai For Photos And Imagery, Erica B. Walker Jan 2024

The Use And Misuse Of Generative Ai For Photos And Imagery, Erica B. Walker

Clemson Teaching Excellence Conference 2024: Teaching in the Age of AI

No abstract provided.


Requiring Students To Integrate Chatgptinto Course Assignments, Mark Small, Venera Balidemaj Jan 2024

Requiring Students To Integrate Chatgptinto Course Assignments, Mark Small, Venera Balidemaj

Clemson Teaching Excellence Conference 2024: Teaching in the Age of AI

No abstract provided.


Ai-Enhanced Education: Fostering Creativity, Efficiency, And Future-Ready Skills, Rodger Eugene Bishop Jan 2024

Ai-Enhanced Education: Fostering Creativity, Efficiency, And Future-Ready Skills, Rodger Eugene Bishop

Clemson Teaching Excellence Conference 2024: Teaching in the Age of AI

No abstract provided.


Using Ai In The Teacher Preparation Programs And Social Studies Classrooms, Brandon Beck Jan 2024

Using Ai In The Teacher Preparation Programs And Social Studies Classrooms, Brandon Beck

Clemson Teaching Excellence Conference 2024: Teaching in the Age of AI

No abstract provided.


Language Portraits: A Space To Explore Identities In A Graduate Course, Hazel Vega Jan 2024

Language Portraits: A Space To Explore Identities In A Graduate Course, Hazel Vega

Clemson Teaching Excellence Conference 2024: Teaching in the Age of AI

No abstract provided.


Critical Ai Engagement: Crafting Assignments That Encourage Productive Engagement With Ai, Carl Ehrett Jan 2024

Critical Ai Engagement: Crafting Assignments That Encourage Productive Engagement With Ai, Carl Ehrett

Clemson Teaching Excellence Conference 2024: Teaching in the Age of AI

No abstract provided.