Open Access. Powered by Scholars. Published by Universities.®

Education Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 31 - 59 of 59

Full-Text Articles in Education

Understanding Sub-Saharan African Learners Informal Learning Using Mobile Devices: A Case Of Tanzania, Laban Bagui, Samwel Dick Mwapwele Apr 2019

Understanding Sub-Saharan African Learners Informal Learning Using Mobile Devices: A Case Of Tanzania, Laban Bagui, Samwel Dick Mwapwele

The African Journal of Information Systems

In this era of pervasive computing and the Internet, learners everywhere connect and reconnect to knowledge away from classrooms, via mobile devices and their Mobile Instant Messaging platforms (MIMs). Still, many sub-Saharan African educators continue to confine these platforms to recreational activities. There is lack therefore of knowledge about how learners from sub-Saharan Africa perform such informal and experiential learning. This paper presents a case study of Tanzanian learners learning in informal settings using their mobile devices and MIMs. It deploys the rhizomatic learning theory with the aim of understanding how such learning occurs. Findings suggest that learners use mobile …


An Examination Of Cybersecurity Knowledge Transfer: Teaching, Research, And Website Security At U.S. Colleges And Universities, Aditya Gupta, James R. Wolf Dec 2018

An Examination Of Cybersecurity Knowledge Transfer: Teaching, Research, And Website Security At U.S. Colleges And Universities, Aditya Gupta, James R. Wolf

Journal of Cybersecurity Education, Research and Practice

This work seeks to answer the question: Does faculty cybersecurity knowledge gained from teaching and research transfer to other IT units in the university? Specifically, do colleges and universities that excel in cybersecurity teaching and research have more secure websites? This work explores a unique setting where the knowledge of the source and recipient are both directly related and observable without outside intervention. Our study employed data from 591 U.S. colleges and universities, the National Centers of Academic Excellence (CAE) program, accepted paper data from the ACM Conference on Computer and Communications Security (CCS) and the IEEE Symposium on Security …


Mapping Knowledge Units Using A Learning Management System (Lms) Course Framework, Casey Rackley Oct 2018

Mapping Knowledge Units Using A Learning Management System (Lms) Course Framework, Casey Rackley

KSU Proceedings on Cybersecurity Education, Research and Practice

ABSTRACT

The purpose of this paper is to examine the outcomes of using a Learning Management System (LMS) course as a framework for mapping the Centers of Academic Excellence in Cyber Defense (CAE-CD) 2019 Knowledge Units (KU) to college courses. The experience shared herein will be useful to faculty who are interested in performing the mapping and applying for CAE-CDE designation.


Cybersecurity Education Employing Experiential Learning, Travis Lowe, Casey Rackley Oct 2018

Cybersecurity Education Employing Experiential Learning, Travis Lowe, Casey Rackley

KSU Proceedings on Cybersecurity Education, Research and Practice

ABSTRACT

The purpose of this paper is to discuss a curriculum design that employs Kolb’s Experiential Learning Theory stages and Kolb’s Learning Styles in four consecutive class sessions. The challenge each class is to present students with perplexing and often frustrating network problems that someday might be encountered on the job. By using Kolb’s theory, students address those problems from the perspective of each learning style, while passing through each phase of the learning cycle. As a result, students gain stronger cognitive thinking skills and hands-on troubleshooting skills in preparation for work as network administrators or cybersecurity analysts.


Digital Fluency: Necessary Competence For Teaching And Learning In Connected Classrooms, Agnes Chigona Sep 2018

Digital Fluency: Necessary Competence For Teaching And Learning In Connected Classrooms, Agnes Chigona

The African Journal of Information Systems

Educators’ digital fluency has been noted as one of the most important skill required for effective curriculum delivery in connected classrooms. Research and anecdotal evidence show that even though many Western Cape classrooms have internet connectivity, many of the educators are unable to take advantage of the connectivity for teaching and learning. Hence, this paper focuses on the educators’ digital fluency as a necessary competence for effective curriculum delivery in connected classrooms. The study was done qualitatively. Randomly selected educators from public schools participated in the one-on-one and focus group interviews. Results show that most educators perceive their digital fluency …


Student Misconceptions About Cybersecurity Concepts: Analysis Of Think-Aloud Interviews, Julia D. Thompson, Geoffrey L. Herman, Travis Scheponik, Linda Oliva, Alan Sherman, Ennis Golaszewski, Dhananjay Phatak, Kostantinos Patsourakos Jul 2018

Student Misconceptions About Cybersecurity Concepts: Analysis Of Think-Aloud Interviews, Julia D. Thompson, Geoffrey L. Herman, Travis Scheponik, Linda Oliva, Alan Sherman, Ennis Golaszewski, Dhananjay Phatak, Kostantinos Patsourakos

Journal of Cybersecurity Education, Research and Practice

We conducted an observational study to document student misconceptions about cybersecurity using thematic analysis of 25 think-aloud interviews. By understanding patterns in student misconceptions, we provide a basis for developing rigorous evidence-based recommendations for improving teaching and assessment methods in cybersecurity and inform future research. This study is the first to explore student cognition and reasoning about cybersecurity. We interviewed students from three diverse institutions. During these interviews, students grappled with security scenarios designed to probe their understanding of cybersecurity, especially adversarial thinking. We analyzed student statements using a structured qualitative method, novice-led paired thematic analysis, to document patterns in …


Information Security Awareness Amongst Students Joining Higher Academic Institutions In Developing Countries: Evidence From Kenya, Joshua R A Ndiege, Gabriel O. Okello May 2018

Information Security Awareness Amongst Students Joining Higher Academic Institutions In Developing Countries: Evidence From Kenya, Joshua R A Ndiege, Gabriel O. Okello

The African Journal of Information Systems

Although there is a steady use of information technology in institutions of higher learning, little is known about the level of information security awareness (ISA) amongst students joining universities in developing countries and more specifically Africa. The purpose of this study was to investigate ISA amongst undergraduate students at a higher education institution in Kenya. The study made use of a quantitative survey approach. Overall, the study findings indicate that majority of the students surveyed did not possess adequate understanding of ISA. Consequently, we submit that there is a strong need to cultivate ISA culture amongst students joining universities in …


Acceptance Of Ict: Applicability Of The Unified Theory Of Acceptance And Use Of Technology (Utaut) To South African Students, Janet Liebenberg, Trudie Benade, Suria Ellis May 2018

Acceptance Of Ict: Applicability Of The Unified Theory Of Acceptance And Use Of Technology (Utaut) To South African Students, Janet Liebenberg, Trudie Benade, Suria Ellis

The African Journal of Information Systems

We are told that university students are Digital Natives and the diffusion of digital technologies into education holds prospective advantages. However, will students in Africa be prepared to engage with and accept the technology? This study aimed to determine the applicability of the Unified Theory of Acceptance and Use of Technology (UTAUT) model within a South African higher education setting and to clarify the factors that are influencing students’ intentions to make use of two digital technologies: an eBook and SLMS. 738 ICT students completed a questionnaire to gauge their responses to Performance expectancy (PEx), Effort expectancy (EfEx), Facilitating conditions …


Tracing Sources Of Design Uncertainty And Controversy In Web 2.0 Facilitated Collaborative Design Process, Lockias Chitanana Dr, Desmond Wesley Govender Dr Apr 2018

Tracing Sources Of Design Uncertainty And Controversy In Web 2.0 Facilitated Collaborative Design Process, Lockias Chitanana Dr, Desmond Wesley Govender Dr

The African Journal of Information Systems

The integration of Internet-based collaborative tools such as Web 2.0 technologies to facilitate the design process has rendered collaborative design a chaotic practice filled with controversy and uncertainty, with the inevitable risk of unintended consequences. The purpose of this study was to trace the sources of design controversy in a Web 2.0 facilitated collaborative design process. The study employed an Actor Network Theory (ANT) methodological framework to explore design controversy in five design teams comprising of 4 to 6 undergraduate engineering students. Data was constituted by following the traces left by the actors, both human and nonhumans, their actions and …


A Toolkit Approach To Information Security Awareness And Education, Peter Korovessis, Steven Furnell, Maria Papadaki, Paul Haskell-Dowland Dec 2017

A Toolkit Approach To Information Security Awareness And Education, Peter Korovessis, Steven Furnell, Maria Papadaki, Paul Haskell-Dowland

Journal of Cybersecurity Education, Research and Practice

In today’s business environment where all operations are enabled by technology, information security has become an established discipline as more and more businesses realize its value. The human component has been recognized to have an important role in information security since the only way to reduce security risks is through making employees more information security aware. Towards this goal the research will appreciate the importance of information security awareness by illustrating the need for more effective user training. Further to that it proposes and develops an information security toolkit as a prototype awareness raising initiative. Apart from the elements of …


The Myths And Realities Of Generational Cohort Theory On Ict Integration In Education: A South African Perspective, Keshnee Padayachee Dec 2017

The Myths And Realities Of Generational Cohort Theory On Ict Integration In Education: A South African Perspective, Keshnee Padayachee

The African Journal of Information Systems

There is an assumption that the younger cohort of teachers who are considered to be digital natives will be able to integrate technology into their teaching spaces with ease. This study aims to determine if there is a difference between generational cohorts with respect to ICT (Information Communication Technology) integration in classrooms among South African teachers. There is a paucity of research on ICT integration in education with respect to generational cohorts. This study involved a secondary analysis of two primary data sets, which contained qualitative and quantitative data. The quantitative data revealed that there are few statistical differences between …


Ssetgami: Secure Software Education Through Gamification, Hector Suarez, Hooper Kincannon, Li Yang Oct 2017

Ssetgami: Secure Software Education Through Gamification, Hector Suarez, Hooper Kincannon, Li Yang

KSU Proceedings on Cybersecurity Education, Research and Practice

Since web browsers have become essential to accomplishing everyday tasks, developing secure web applications has become a priority in order to protect user data, corporate databases and critical infrastructure against cyber-crimes . This research presents a game-like (gamification) approach to teach key concepts and skills on how to develop secure web applications. Gamification draws on motivational models, one of psychological theories. Gamification design has great potential over traditional education where we often find students demotivated and lecturers failing to engage them in learning activities. This research created game-like learning modules to teach top vulnerabilities and countermeasures for these top vulnerabilities …


An Evaluation Of Educational Values Of Youtube Videos For Academic Writing, Gbolahan Olasina Sep 2017

An Evaluation Of Educational Values Of Youtube Videos For Academic Writing, Gbolahan Olasina

The African Journal of Information Systems

The aim is to assess the impact of YouTube videos about academic writing and its skills on the writing performance of students. Theoretical perspectives from constructivism and associated learning models are used to inform the purpose of the research. The contextual setting is matriculation students awaiting admission to higher institutions. The population is 40 students belonging to a class aimed at assisting disadvantaged students in their academic writing in Scottsville, Province of KwaZulu-Natal, South Africa. The students are broken into two groups – control/traditional teaching and the treatment/YouTube facilitated groups. Consequently, a dominant qualitative approach is adopted using focus group …


Planning And Implementing A Successful Nsa-Nsf Gencyber Summer Cyber Academy, Bryson R. Payne, Tamirat Abegaz, Keith Antonia Dec 2016

Planning And Implementing A Successful Nsa-Nsf Gencyber Summer Cyber Academy, Bryson R. Payne, Tamirat Abegaz, Keith Antonia

Journal of Cybersecurity Education, Research and Practice

The GenCyber program is jointly sponsored by the National Security Agency (NSA) and the National Science Foundation (NSF) to help faculty and cybersecurity experts provide summer cybersecurity camp experiences for K-12 students and teachers. The main objective of the program is to attract, educate, and motivate a new generation of young men and women to help address the nationwide shortage of trained cybersecurity professionals. The curriculum is flexible and centers on ten cybersecurity first principles. Currently, GenCyber provides cyber camp options for three types of audiences: students, teachers, and a combination of both teachers and students. In 2016, over 120 …


Planning And Implementing A Successful Nsa-Nsf Gencyber Summer Cyber Academy, Bryson R. Payne, Tamirat Abegaz, Keith Antonia Oct 2016

Planning And Implementing A Successful Nsa-Nsf Gencyber Summer Cyber Academy, Bryson R. Payne, Tamirat Abegaz, Keith Antonia

KSU Proceedings on Cybersecurity Education, Research and Practice

The GenCyber program is jointly sponsored by the National Security Agency (NSA) and the National Science Foundation (NSF) to help faculty and cybersecurity experts provide summer cybersecurity camp experiences for K-12 students and teachers. The main objective of the program is to attract, educate, and motivate a new generation of young men and women to help address the nationwide shortage of trained cybersecurity professionals. The curriculum is flexible and centers on ten cybersecurity first principles. Currently, GenCyber provides cyber camp options for three types of audiences: students, teachers, and a combination of both teachers and students. In 2016, over 120 …


Teaching Security Of Internet Of Things In Using Raspberrypi, Oliver Nichols, Li Yang, Xiaohong Yuan Oct 2016

Teaching Security Of Internet Of Things In Using Raspberrypi, Oliver Nichols, Li Yang, Xiaohong Yuan

KSU Proceedings on Cybersecurity Education, Research and Practice

The Internet of Things (IoTs) is becoming a reality in today’s society. The IoTs can find its application in multiple domains including healthcare, critical infrastructure, transportation, and home and personal use. It is important to teach students importance and techniques that are essential in protecting IoTs. We design a series of hands-on labs in a smart home setting, which can exercise attack and protection of IoTs. Our hands-on labs use a Raspberry Pi and several diverse smart things that communicate through Z-Wave technology. Using this environment, students can operate a home automation system and learn security concepts by performing these …


Teaching Static Call Analysis To Detect Anomalous Software Behavior, Jordan Shropshire, Philip Menard Oct 2016

Teaching Static Call Analysis To Detect Anomalous Software Behavior, Jordan Shropshire, Philip Menard

KSU Proceedings on Cybersecurity Education, Research and Practice

Malicious code detection is a critical part of any cyber security operation. Typically, the behavior of normal applications is modeled so that deviations from normal behavior can be identified. There are multiple approach to modeling good behavior but the most common approach is to observe applications’ system call activity. System calls are messages passed between user space applications and their underlying operating systems. The detection of irregular system call activity signals the presence of malicious software behavior. This method of malware-detection has been used successfully for almost two decades. Unfortunately, it can be difficult to cover this concept at the …


Perceptions Of Information And Communications Technology (Ict) For Instructional Delivery At A University: From Technophobic To Technologically Savvy, Desmond Wesley Govender Dr, Lockias Chitanana Mr Apr 2016

Perceptions Of Information And Communications Technology (Ict) For Instructional Delivery At A University: From Technophobic To Technologically Savvy, Desmond Wesley Govender Dr, Lockias Chitanana Mr

The African Journal of Information Systems

Changing academics’ perceptions of information and communications technology (ICT) in developing countries has always been a challenge. A university in Zimbawe has witnessed an about-turn in lecturers’ perceptions and beliefs about technology, from being negative (technophobic) to positive (technologically savvy) users of technology. This paper reports on the interplay of factors that resulted in lecturers’ buy-in to the use of e-learning as a mode of instructional delivery. The study employed actor network theory (ANT) as both a methodological and analytical framework to trace the trajectory of the e-learning programme at this university. The conspicuous actors were followed using questionnaires, participant …


The Role Of Educational Technology In Design And Delivery Of Curricula Programmes: A Case Of Steps At A University Of Technology, Patient Rambe Dr Apr 2016

The Role Of Educational Technology In Design And Delivery Of Curricula Programmes: A Case Of Steps At A University Of Technology, Patient Rambe Dr

The African Journal of Information Systems

While Universities of Technologies (UoTs) regard the adoption of educational technology for the creation of effective learning environments as one of their defining features, there is limited research on these universities’ innovative use of technologies to transform their curricula design and delivery. This research explores the extent to which educational technology has been integrated into the implementation of new and recurriculated educational programmes under the Strategic Transformation of Educational Programmes and Structures (STEPS) at a UoT. The research employed document analysis and interview data from middle level managers (Deans), curriculum designers and educational technologists. The findings suggest that, except for …


Elearning Cost Analysis Of On-Premise Versus Cloud-Hosted Implementation In Sub-Saharan Countries, Joel Samson Mtebe, Roope Raisamo Apr 2014

Elearning Cost Analysis Of On-Premise Versus Cloud-Hosted Implementation In Sub-Saharan Countries, Joel Samson Mtebe, Roope Raisamo

The African Journal of Information Systems

The cost of acquiring, managing, and maintaining ICT infrastructure is one of the main factors that hinder educational institutions in Sub-Saharan countries to adopt and implement eLearning. Recently, cloud computing has emerged as a new computing paradigm for delivering cost effective computing services that can be used to harness eLearning. However, the adoption of cloud computing in higher education in Sub-Saharan countries is very low. Although there are many factors that may influence educational institutions to adopt cloud services, cost effectiveness is often a key factor. Far too little is known on how much the use of cloud computing can …


When My Sub-Editor Is A Nit-Picking Bot: Mediating Roles Of A Tv News Scriptwriting Exercise, Andrew Deacon, Catherine Wynsculley Jul 2013

When My Sub-Editor Is A Nit-Picking Bot: Mediating Roles Of A Tv News Scriptwriting Exercise, Andrew Deacon, Catherine Wynsculley

The African Journal of Information Systems

Online learning activities have promised new ways to engage students. This paper describes the design and use of the NewsScripts online learning exercise over a decade. This web-based television news scriptwriting exercise is used with media students at the University of Cape Town to expose them to news scriptwriting practices. Students write a script to match a video, employing a television news writing style. The more important transformational opportunity is deepening students’ own critical media analysis skills. Our focus is how the NewsScripts design evolved and changed over time to remain part of the curriculum. Underlying the curricula of university …


Ict In Education In Africa - Myth Or Reality: A Case Study Of Mozambican Higher Education Institutions, Xavier Muianga, Henrik Hansson, Anders Nilsson, Avelino Mondlane, Inocente Mutimucuio, Alsone Guambe Jul 2013

Ict In Education In Africa - Myth Or Reality: A Case Study Of Mozambican Higher Education Institutions, Xavier Muianga, Henrik Hansson, Anders Nilsson, Avelino Mondlane, Inocente Mutimucuio, Alsone Guambe

The African Journal of Information Systems

In the last decade, there has been a growth in Information Communication and Technology for Education (ICT4E) in sub-Saharan Africa. Through support from local and international development agencies, several Higher Education Institutions (HEIs) have engaged in introducing, implementing and supporting ICT4E. This study aims at providing a description and analysis of the current state of ICT4E implementation in HEIs in Mozambique. An exploratory study of 19 HEIs was conducted using open ended questionnaires and interviews. The results show that the country has advanced greatly in terms of design and implementation of ICT policies, as well as telecommunication. Additionally, MoReNet the …


Towards A Shared Understanding Of Emerging Technologies: Experiences In A Collaborative Research Project In South Africa, Daniela Gachago, Eunice Ivala, Judy Backhouse, Jan Petrus Bosman, Vivienne Bozalek, Dick Ng’Ambi Jul 2013

Towards A Shared Understanding Of Emerging Technologies: Experiences In A Collaborative Research Project In South Africa, Daniela Gachago, Eunice Ivala, Judy Backhouse, Jan Petrus Bosman, Vivienne Bozalek, Dick Ng’Ambi

The African Journal of Information Systems

While the practice of using educational technologies in Higher Education is increasingly common among educators, there is a paucity of research on innovative uses of emerging technologies to transform teaching and learning. This paper draws on data collected as part of a larger study aimed at investigating emerging technologies and their use in South African Higher Education Institutions (HEIs) to improve teaching and learning. The research employed a mixed method research design, using both qualitative and quantitative data collection methods—quantitative data from a survey of 262 respondents from 22 public HEIs in South Africa and qualitative data gathered from 16 …


Considering Two Audiences When Recording Lectures As Lecturecasts, Brandon I. Collier-Reed Jul 2013

Considering Two Audiences When Recording Lectures As Lecturecasts, Brandon I. Collier-Reed

The African Journal of Information Systems

This article presents the outcome of an investigation into the provision of lecturecasts to students. The objective was to ensure that both those who attended live lectures of a second-year engineering course and/or watched recorded versions of the lectures had an experience that supported their learning. A range of data was drawn on including the personal reflection of the lecturer of the course, questionnaires, and student interviews. The qualitative data were analysed through an inductive process that drew on the principles of grounded theory and the findings that emerged included the role of the “talking head” in recordings, balancing the …


E/Merging Across Africa: Five Papers On The Use Of Educational Technology In African Higher Education, Tony Carr Jul 2013

E/Merging Across Africa: Five Papers On The Use Of Educational Technology In African Higher Education, Tony Carr

The African Journal of Information Systems

This guest editorial comments on the rapidly changing environment for the use of Information and Communication Technologies (ICTs) in African Higher Education Institutions (HEI), introduces the e/merge online conferences and gives a brief introduction to the papers in the special issue.


Database Security: What Students Need To Know, Meg C. Murray Jan 2010

Database Security: What Students Need To Know, Meg C. Murray

Faculty and Research Publications

Database security is a growing concern evidenced by an increase in the number of reported incidents of loss of or unauthorized exposure to sensitive data. As the amount of data collected, retained and shared electronically expands, so does the need to understand database security. The Defense Information Systems Agency of the US Department of Defense (2004), in its Database Security Technical Implementation Guide, states that database security should provide controlled, protected access to the contents of a database as well as preserve the integrity, consistency, and overall quality of the data. Students in the computing disciplines must develop an …


A Model For Using A Capstone Experience As One Method Of Assessment Of An Information Systems Degree Program, Meg C. Murray, Jorge Pérez, Mario Guimaraes Jul 2008

A Model For Using A Capstone Experience As One Method Of Assessment Of An Information Systems Degree Program, Meg C. Murray, Jorge Pérez, Mario Guimaraes

Faculty and Research Publications

Student attainment of educational outcomes is a core purpose of any institution of higher education and assessment provides a vehicle through which a program of study is able to ascertain how well it is achieving its stated learning outcomes and how program improvement might be achieved. Assessment of student learning begins with the clear definition and articulation of learning outcomes, followed by offering learning experiences, assessing student achievement of learning outcomes and using the results to improve teaching, learning, planning and allocation of resources (Middle States Accreditation Commission, 2005). A renewed emphasis on assessment is leading to the identification and …


Journey To The Center Of The Core: Computers And The Internet In The Core Curriculum, Jorge Pérez, Meg C. Murray Jan 2006

Journey To The Center Of The Core: Computers And The Internet In The Core Curriculum, Jorge Pérez, Meg C. Murray

Faculty and Research Publications

Computers, digitalization and the Internet have transformed modern society. Commerce, education, communication and socialization will never be the same. Surprisingly, many universities do not require a computing course in the core curriculum. Critical information technology (IT) competencies are often taken for granted, to the detriment of students who lack computing and Internet skills. This paper describes an initiative undertaken by a computer science and information systems department to assess and remediate IT skills needed by all university students, regardless of major. The project is evolving along several dimensions: identification of discipline-independent IT competencies, assessment of IT skills among current and …


Personality And Programming, Amy B. Woszczynski, Tracy C. Guthrie, Sherri Shade Oct 2005

Personality And Programming, Amy B. Woszczynski, Tracy C. Guthrie, Sherri Shade

Faculty and Research Publications

Information systems students continue to struggle to successfully complete computer programming classes. Learning how to program is difficult, and failure and attrition rates in college level programming classes remain at an unacceptably high rate. Since many IS students take a programming course as part of their program of study, IS educators should better understand why IS students tend to achieve low success rates in programming courses and what can be done to improve success rates. Little research to date has addressed potential reasons for student failure in programming principles courses. Many educators simply assume that high failure rates are acceptable …