Open Access. Powered by Scholars. Published by Universities.®

Education Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Computer Sciences

Old Dominion University

Keyword
Publication Year
Publication
Publication Type

Articles 1 - 30 of 52

Full-Text Articles in Education

What Students Have To Say On Data Privacy For Educational Technology, Stephanie Choi Apr 2024

What Students Have To Say On Data Privacy For Educational Technology, Stephanie Choi

Cybersecurity Undergraduate Research Showcase

The literature on data privacy in terms of educational technology is a growing area of study. The perspective of educators has been captured extensively. However, the literature on students’ perspectives is missing, which is what we explore in this paper. We use a pragmatic qualitative approach with an experiential lens to capture students’ attitudes towards data privacy in terms of educational technology. We identified preliminary, common themes that appeared in the survey responses. The paper concludes by calling for more research on how students perceive data privacy in terms of educational technology.


The Security Of Deep Neural Networks, Jalaya Allen Apr 2024

The Security Of Deep Neural Networks, Jalaya Allen

Cybersecurity Undergraduate Research Showcase

Our society has transitioned from our primitive lifestyle to soon, an increasingly automatic one. That idea is further exemplified as we shift into an AI era, better known as Artificial intelligence. Artificial Intelligence is classified as computer systems that can perform tasks that typically require human intelligence. However, a common thought or question that most might have is, how is this done? How does AI process information the way we want it to and have access to so much information? AI is trained by systems called AI models. These modeling programs are trained on data to recognize patterns or make …


Improving Educational Delivery And Content In Juvenile Detention Centers, Yomna Elmousalami Mar 2024

Improving Educational Delivery And Content In Juvenile Detention Centers, Yomna Elmousalami

Undergraduate Research Symposium

Students in juvenile detention centers have the greatest need to receive improvements in educational delivery and content; however, they are one of the “truly disadvantaged” populations in terms of receiving those improvements. This work presents a qualitative data analysis based on a focus group meeting with stakeholders at a local Juvenile Detention Center. The current educational system in juvenile detention centers is based on paper worksheets, single-room style teaching methods, outdated technology, and a shortage of textbooks and teachers. In addition, detained students typically have behavioral challenges that are deemed "undesired" in society. As a result, many students miss classes …


Automatic Classification Of Activities In Classroom Videos, Jonathan K. Foster, Matthew Korban, Peter Youngs, Ginger S. Watson, Scott T. Acton Jan 2024

Automatic Classification Of Activities In Classroom Videos, Jonathan K. Foster, Matthew Korban, Peter Youngs, Ginger S. Watson, Scott T. Acton

VMASC Publications

Classroom videos are a common source of data for educational researchers studying classroom interactions as well as a resource for teacher education and professional development. Over the last several decades emerging technologies have been applied to classroom videos to record, transcribe, and analyze classroom interactions. With the rise of machine learning, we report on the development and validation of neural networks to classify instructional activities using video signals, without analyzing speech or audio features, from a large corpus of nearly 250 h of classroom videos from elementary mathematics and English language arts instruction. Results indicated that the neural networks performed …


Higher Education Faculty Perceptions Of Chatgpt And The Influencing Factors: A Sentiment Analysis Of X, Yoseph Mamo, Helen Crompton, Diane Burke, Christine E. Nickel Jan 2024

Higher Education Faculty Perceptions Of Chatgpt And The Influencing Factors: A Sentiment Analysis Of X, Yoseph Mamo, Helen Crompton, Diane Burke, Christine E. Nickel

STEMPS Faculty Publications

ChatGPT, an AI chatbot developed by OpenAI, was released in November 2022, sparking a significant surge in global awareness and utilization of generative AI across various domains. Although recent studies have acknowledged the significance of ChatGPT in the education sector, they have yet to focus on exploring faculty attitudes toward ChatGPT. We gathered a comprehensive corpus of tweets containing “#ChatGPT” and “#highered” between November 30th, 2022, and April 30th, 2023. We analyzed data by triangulating VADER, NRC lexicon, and ground coding. Findings suggest that 40% of the expressed sentiments were positive, 51% were neutral, and 9% were negative. The study …


The Educational Affordances And Challenges Of Chatgpt: State Of The Field, Helen Crompton, Diane Burke Jan 2024

The Educational Affordances And Challenges Of Chatgpt: State Of The Field, Helen Crompton, Diane Burke

STEMPS Faculty Publications

ChatGPT was released to the public in November 30, 2022. This study examines how ChatGPT can be used by educators and students to promote learning and what are the challenges and limitations. This study is unique in providing one of the first systematic reviews using peer review studies to provide an early examination of the field. Using PRISMA principles, 44 articles were selected for review. Grounded coding was then used to reveal trends in the data. The findings show that educators can use ChatGPT for teaching support, task automation, and professional development. These were further delineated further by axial sub …


Types Of Teacher-Ai Collaboration In K-12 Classroom Instruction: Chinese Teachers' Perspective, Jinhee Kim Jan 2024

Types Of Teacher-Ai Collaboration In K-12 Classroom Instruction: Chinese Teachers' Perspective, Jinhee Kim

STEMPS Faculty Publications

The advancing power and capabilities of artificial intelligence (AI) have expanded the roles of AI in education and have created the possibility for teachers to collaborate with AI in classroom instruction. However, the potential types of teacher-AI collaboration (TAC) in classroom instruction and the benefits and challenges of implementing TAC are still elusive. This study, therefore, aimed to explore different types of TAC and the potential benefits and obstacles of TAC through Focus Group Interviews with 30 Chinese teachers. The study found that teachers anticipated six types of TAC, which are thematized as One Teach, One Observe; One Teach, One …


Different Visions From Biosview: A Brief Report, Lucas N. Potter, Xavier-Lewis Palmer Jan 2024

Different Visions From Biosview: A Brief Report, Lucas N. Potter, Xavier-Lewis Palmer

Electrical & Computer Engineering Faculty Publications

In this collaborative research endeavor at the intersection of biological safety and cybersecurity for BiosView labs, the authors highlight their engagement with a diverse student cohort. The chapter delves into the motivation behind collaborations extending beyond traditional academic research environments, emphasizing inclusivity. The meticulous examination of student demographics, including gender, self-reported ethnicity, and national origin, is detailed in the methodology. A student-centric approach is central to the exploration, focusing on aligning teaching and management styles with unique student needs. The chapter elaborates on effective teaching methodologies and management practices tailored for BiosView labs. A dedicated section emphasizes the purpose of …


The Underrepresentation Of Black Females In Cybersecurity, Makendra Latrice Crosby Dec 2023

The Underrepresentation Of Black Females In Cybersecurity, Makendra Latrice Crosby

Cybersecurity Undergraduate Research Showcase

The significance of cybersecurity methods, strategies, and programs in protecting computers and electronic devices is crucial throughout the technological infrastructure. Despite the considerable growth in the cybersecurity field and its expansive workforce, there exists a notable underrepresentation, specifically among Black/African American females. This study examines the barriers hindering the inclusion of Black women in the cybersecurity workforce such as socioeconomic factors, limited educational access, biases, and workplace culture. The urgency of addressing these challenges calls for solutions such as education programs, mentorship initiatives, creating inclusive workplace environments, and promoting advocacy and increased awareness within the cybersecurity field. Additionally, this paper …


How Chatgpt Can Be Used As A Defense Mechanism For Cyber Attacks, Michelle Ayaim Dec 2023

How Chatgpt Can Be Used As A Defense Mechanism For Cyber Attacks, Michelle Ayaim

Cybersecurity Undergraduate Research Showcase

The powers of OpenAI's groundbreaking AI language model, ChatGPT, startled millions of users when it was released in November. But for many, the tool's ability to further accomplish the goals of evil actors swiftly replaced their initial excitement with significant concerns. ChatGPT gives malicious actors additional ways to possibly compromise sophisticated cybersecurity software. Leaders in a sector that is currently suffering from a 38% global spike in data breaches in 2022 must acknowledge the rising influence of AI and take appropriate action. Cybercriminals are writing more complex and focused business email compromise (BEC) and other phishing emails with the assistance …


Digital Game-Based Approach To Math Learning For Students, Gul Ayaz, Katherine Smith Apr 2023

Digital Game-Based Approach To Math Learning For Students, Gul Ayaz, Katherine Smith

Modeling, Simulation and Visualization Student Capstone Conference

Mathematics is an important subject that is pervasive across many disciplines. It is also a subject that has proven to be challenging to both teach and learn. Students face many challenges with learning math such as a lack of motivation and anxiety. To address these challenges, game-based learning has become a popular approach to stimulate students and create a more positive classroom environment. It can serve as an alternative or supplement to traditional teaching and can better engage students while developing a positive attitude toward learning. The use of games in a classroom can create a more exciting and engaging …


Artificial Intelligence In Higher Education: The State Of The Field, Helen Crompton, Diane Burke Apr 2023

Artificial Intelligence In Higher Education: The State Of The Field, Helen Crompton, Diane Burke

Teaching & Learning Faculty Publications

This systematic review provides unique findings with an up-to-date examination of artificial intelligence (AI) in higher education (HE) from 2016 to 2022. Using PRISMA principles and protocol, 138 articles were identified for a full examination. Using a priori, and grounded coding, the data from the 138 articles were extracted, analyzed, and coded. The findings of this study show that in 2021 and 2022, publications rose nearly two to three times the number of previous years. With this rapid rise in the number of AIEd HE publications, new trends have emerged. The findings show that research was conducted in six of …


Integration Of Omnet++ Into A Networking Course In An Electrical Engineering Technology Program, Murat Kuzlu, Brian Emmanuel Tamayo, Salih Sarp, Otilia Popescu, Vukica M. Jovanovic Jan 2023

Integration Of Omnet++ Into A Networking Course In An Electrical Engineering Technology Program, Murat Kuzlu, Brian Emmanuel Tamayo, Salih Sarp, Otilia Popescu, Vukica M. Jovanovic

Engineering Technology Faculty Publications

Networking courses are an integral part of electrical engineering technology programs as the majority of electronics in the modern day are required to communicate with each other. They are also getting more attention in manufacturing engineering technology programs because of the development of emerging technologies in Industry 4.0 arena. From laptops, computers, cellphones, modern day vehicles and smart refrigerators, these devices require a certain level of networking in order to communicate with other devices, whether it be locally, or even across the other side of the world. The objective of networking courses in an electrical engineering program is to demonstrate …


Speculative Futures On Chatgpt And Generative Artificial Intelligence (Ai): A Collective Reflection From The Educational Landscape, Aras Bozkurt, Junhong Xiao, Sarah Lambert, Angelica Pazurek, Helen Crompton, Suzan Koseoglu, Robert Farrow, Melissa Bond, Chrissi Nerantzi, Sarah Honeychurch, Maha Bali, Jon Dron, Kamran Mir, Bonnie Stewart, Eamon Costello, Jon Mason, Christian M. Stracke, Enilda Romero-Hall, Apostolos Koutropoulos, Cathy Mae Toquero, Lenandlar Singh, Ahmed Tlili, Kyungmee Lee, Mark Nichols, Ebba Ossiannilsson, Mark Brown, Valerie Irvine, Juliana Elisa Raffaghelli, Gema Santos-Hermosa, Orna Farrell, Taskeen Adam, Ying Li Thong, Sunagul Sani-Bozkurt, Ramesh C. Sharma, Stefan Hrastinski, Petar Jandrić Jan 2023

Speculative Futures On Chatgpt And Generative Artificial Intelligence (Ai): A Collective Reflection From The Educational Landscape, Aras Bozkurt, Junhong Xiao, Sarah Lambert, Angelica Pazurek, Helen Crompton, Suzan Koseoglu, Robert Farrow, Melissa Bond, Chrissi Nerantzi, Sarah Honeychurch, Maha Bali, Jon Dron, Kamran Mir, Bonnie Stewart, Eamon Costello, Jon Mason, Christian M. Stracke, Enilda Romero-Hall, Apostolos Koutropoulos, Cathy Mae Toquero, Lenandlar Singh, Ahmed Tlili, Kyungmee Lee, Mark Nichols, Ebba Ossiannilsson, Mark Brown, Valerie Irvine, Juliana Elisa Raffaghelli, Gema Santos-Hermosa, Orna Farrell, Taskeen Adam, Ying Li Thong, Sunagul Sani-Bozkurt, Ramesh C. Sharma, Stefan Hrastinski, Petar Jandrić

Teaching & Learning Faculty Publications

While ChatGPT has recently become very popular, AI has a long history and philosophy. This paper intends to explore the promises and pitfalls of the Generative Pre-trained Transformer (GPT) AI and potentially future technologies by adopting a speculative methodology. Speculative future narratives with a specific focus on educational contexts are provided in an attempt to identify emerging themes and discuss their implications for education in the 21st century. Affordances of (using) AI in Education (AIEd) and possible adverse effects are identified and discussed which emerge from the narratives. It is argued that now is the best of times to define …


Ict Security Tools And Techniques Among Higher Education Institutions: A Critical Review, Miko Nuñez, Xavier-Lewis Palmer, Lucas Potter, Chris Jordan Aliac, Lemuel Clark Velasco Jan 2023

Ict Security Tools And Techniques Among Higher Education Institutions: A Critical Review, Miko Nuñez, Xavier-Lewis Palmer, Lucas Potter, Chris Jordan Aliac, Lemuel Clark Velasco

Electrical & Computer Engineering Faculty Publications

Higher education institutions (HEIs) are increasingly relying on digital technologies for classroom and organizational management, but this puts them at higher risk for information and communication (ICT security attacks. Recent studies show that HEIs have experienced more security breaches in ICT security composed of both cybersecurity an information security. A literature review was conducted to identify common ICT security practices in HEIs over the last decade. 11 journal articles were profiled and analyzed, revealing threats to HEIs’ security and protective measures in terms of organizational security, technological security, physical security, and standards and frameworks. Security tools and techniques were grouped …


The Message Design Of Raiders Of The Lost Ark On The Atari 2600 & A Fan’S Map, Quick Start, And Strategy Guide, Miguel Ramlatchan, William I. Ramlatchan Jul 2022

The Message Design Of Raiders Of The Lost Ark On The Atari 2600 & A Fan’S Map, Quick Start, And Strategy Guide, Miguel Ramlatchan, William I. Ramlatchan

Distance Learning Faculty & Staff Books

The message design and human performance technology in video games, especially early video games have always been fascinating to me. From an instructional design perspective, the capabilities of the technology of the classic game consoles required a careful balance of achievable objectives, cognitive task analysis, guided problem solving, and message design. Raiders on the Atari is an excellent example of this balance. It is an epic adventure game, spanning 13+ distinct areas, with an inventory of items, where those hard to find items had to be used by the player to solve problems during their quest (and who would have …


A Technological Skills Gap: What Can We Do About It?, Will Moore Apr 2022

A Technological Skills Gap: What Can We Do About It?, Will Moore

Cybersecurity Undergraduate Research Showcase

In the last thirty years, education has transformed faster than ever before. As a society we have developed new classroom technologies that allow for better communication and access to more information than ever before. However, at the same time, education seems rockier than ever before. Several major companies, including Tesla, Apple, Google and Netflix, no longer require a college degree for employment, and many companies, such as Amazon, Google, and Microsoft, have begun programs to train their own employees in skills and create their own certification programs to help employees learn necessary skills (Akhtar, O’Donnell). Why do these major corporations …


Protecting Blind Screen-Reader Users From Deceptive Content, Ash Dobrenen, Vikas Ashok (Mentor) Jan 2022

Protecting Blind Screen-Reader Users From Deceptive Content, Ash Dobrenen, Vikas Ashok (Mentor)

Computer & Information Science: Research Experiences for Undergraduates in Disinformation Detection and Analytics

Visually impaired people who want to use a computer rely on screen readers to independently do this. This research focuses on beginning to build a chrome extension in order to help users more safely navigate the internet using a screen reader. to begin collecting the data, a screen reader was used to help determine items in the website that might take the user somewhere they did not mean to go since the link or image was not sufficiently able to be described by the screen reader. Next, those items were tagged with ’data-attribute=”deceptive”’. After, those data-attributes were extracted and tagged …


Attitudes About Cybersecurity Articulation Agreements And Transfer Students: A Statewide Survey Of Faculty Members And Advisors, Brian K. Payne, Tracy Vandecar-Burdin, Daniela Cigularova Jan 2022

Attitudes About Cybersecurity Articulation Agreements And Transfer Students: A Statewide Survey Of Faculty Members And Advisors, Brian K. Payne, Tracy Vandecar-Burdin, Daniela Cigularova

Sociology & Criminal Justice Faculty Publications

In this study, cybersecurity faculty and academic advisors from community colleges and 4-year universities in the southeast region of the United States completed a survey assessing attitudes about and support for articulation agreements and related transfer policies. Hypothesizing that professional structures shape attitudes and experiences, the researchers conducted an exploratory quantitative study with primarily descriptive analyses. The results reveal differences in attitudes between community college and 4-year stakeholders and between faculty and academic advisors. The results of this study are discussed in relation to faculty and advisor training and communication.


A Look Into Increasing The Number Of Veterans And Former Government Employees Converting To Career And Technical Cybersecurity Teachers, Vukica M. Jovanovic, Michael Anthony Crespo, Drew E. Brown, Deborah Marshall, Otilia Popescu, Murat Kuzlu, Petros J. Katsioloudis, Linda Vahala Jul 2021

A Look Into Increasing The Number Of Veterans And Former Government Employees Converting To Career And Technical Cybersecurity Teachers, Vukica M. Jovanovic, Michael Anthony Crespo, Drew E. Brown, Deborah Marshall, Otilia Popescu, Murat Kuzlu, Petros J. Katsioloudis, Linda Vahala

Engineering Technology Faculty Publications

The current state of technology with recent explosions in the digital processing of paperwork, computer networking use, and online and virtual approaches to areas, which until very recently had traditional and non-computerized ways of operating, led to a steady increase in the demand for jobs in the area of computer science and cybersecurity. The education system, the pipeline for the incoming workforce, needs to keep up with this tremendous pace in technology and the job market. The current K-12 school system has been extensively challenged to fill out necessary positions in order to address the increasing need for programs that …


Investigating Pre-Service Teachers’ Perceptions Of The Virginia Computer Science Standards Of Learning: A Qualitative Multiple Case Study, Valerie Sledd Taylor Apr 2021

Investigating Pre-Service Teachers’ Perceptions Of The Virginia Computer Science Standards Of Learning: A Qualitative Multiple Case Study, Valerie Sledd Taylor

Educational Foundations & Leadership Theses & Dissertations

Computer science education is being recognized globally as necessary to better prepare students in all grade levels, K-12, for future success. As a result of this focus on computer science education in the United States and around the world, there is an increased demand for highly qualified teachers with content and pedagogical knowledge to successfully support student learning. As a result, there is a call to include and improve the computer science training offered to pre-service teachers in their educator preparation programs from methods courses to practicum and student teaching experiences. Thus, it is important to understand how pre-service teachers …


Internet-Of-Things Devices In Support Of The Development Of Echoic Skills Among Children With Autism Spectrum Disorder, Krzysztof J. Rechowicz, John B. Stull, Michelle M. Hascall, Saikou Y. Diallo, Kevin J. O'Brien Jan 2021

Internet-Of-Things Devices In Support Of The Development Of Echoic Skills Among Children With Autism Spectrum Disorder, Krzysztof J. Rechowicz, John B. Stull, Michelle M. Hascall, Saikou Y. Diallo, Kevin J. O'Brien

VMASC Publications

A significant therapeutic challenge for people with disabilities is the development of verbal and echoic skills. Digital voice assistants (DVAs), such as Amazon’s Alexa, provide networked intelligence to billions of Internet-of-Things devices and have the potential to offer opportunities to people, such as those diagnosed with autism spectrum disorder (ASD), to advance these necessary skills. Voice interfaces can enable children with ASD to practice such skills at home; however, it remains unclear whether DVAs can be as proficient as therapists in recognizing utterances by a developing speaker. We developed an Alexa-based skill called ASPECT to measure how well the DVA …


Assessment And Learning In Knowledge Spaces (Aleks) Adaptive System Impact On Students' Perception And Self-Regulated Learning Skills, Honda Harati, Laura Sujo-Montes, Chih-Hsiung Tu, Shadow J.W. Armfield, Cherng-Jyh Yen Jan 2021

Assessment And Learning In Knowledge Spaces (Aleks) Adaptive System Impact On Students' Perception And Self-Regulated Learning Skills, Honda Harati, Laura Sujo-Montes, Chih-Hsiung Tu, Shadow J.W. Armfield, Cherng-Jyh Yen

Educational Foundations & Leadership Faculty Publications

Adaptive learning is an educational method that uses computer algorithms and artificial intelligence (AI) to customize learning materials and activities based on each user's model. Adaptive learning has been used for more than 20 years. However, it is still unique, and no other system could bring more or even similar capabilities than the ones adaptive technology offers, including the application of AI, psychology, psychometrics, machine learning, and providing a personalized learning environment. However, there are not many studies on its practicality, usefulness, improving students' learning skills, students' perception, etc., due to the limited number of institutes investing in this new …


A Literature Review Of Quantum Education In K-12 Level, Yuming He, Shenghua Zha, Wu He, Theo Bastiaens (Ed.) Jan 2021

A Literature Review Of Quantum Education In K-12 Level, Yuming He, Shenghua Zha, Wu He, Theo Bastiaens (Ed.)

Information Technology & Decision Sciences Faculty Publications

Quantum computing is an emerging technology paradigm of computing and has the potential to solve computational problems intractable using today’s classical computers or digital technology. Quantum computing is expected to be disruptive for many industries. The power of quantum computing technologies is based on the fundamentals of quantum mechanics, such as quantum superposition, quantum entanglement, or the no-cloning theorem. To build a highly trained and skilled quantum workforce that meets future industry needs, there is a need to introduce quantum concepts early on in K-12 schools since the learning of quantum is a lengthy process. As fundamental quantum concepts derive …


Exploring Cybersecurity Education At The K-12 Level, Weiru Chen, Yuming He, Xin Tian, Wu He, E. Langran (Ed.), D. Rutledge (Ed.) Jan 2021

Exploring Cybersecurity Education At The K-12 Level, Weiru Chen, Yuming He, Xin Tian, Wu He, E. Langran (Ed.), D. Rutledge (Ed.)

Information Technology & Decision Sciences Faculty Publications

K-12 cybersecurity education is receiving growing attention with the growing number of cyberattacks and a shortage of cybersecurity professionals. However, there are many barriers for teachers to implement effective cybersecurity education in formal classroom environments. This study conducts a systematic literature review to examine the current state-of-the-art on K-12 cybersecurity education. Through the systematic literature review, we identified 20 closely relevant papers and recognized that a well-designed curriculum in cybersecurity education at the K-12 level is strongly needed to motivate students to pursue cybersecurity pathways and careers. The challenge and suggestions of curriculum design, teaching strategy, and learning assessment are …


Systematizing Confidence In Open Research And Evidence (Score), Nazanin Alipourfard, Beatrix Arendt, Daniel M. Benjamin, Noam Benkler, Michael Bishop, Mark Burstein, Martin Bush, James Caverlee, Yiling Chen, Chae Clark, Anna Dreber Almenberg, Timothy M. Errington, Fiona Fidler, Nicholas Fox, Aaron Frank, Hannah Fraser, Scott Friedman, Ben Gelman, James Gentile, Jian Wu, Et Al., Score Collaboration Jan 2021

Systematizing Confidence In Open Research And Evidence (Score), Nazanin Alipourfard, Beatrix Arendt, Daniel M. Benjamin, Noam Benkler, Michael Bishop, Mark Burstein, Martin Bush, James Caverlee, Yiling Chen, Chae Clark, Anna Dreber Almenberg, Timothy M. Errington, Fiona Fidler, Nicholas Fox, Aaron Frank, Hannah Fraser, Scott Friedman, Ben Gelman, James Gentile, Jian Wu, Et Al., Score Collaboration

Computer Science Faculty Publications

Assessing the credibility of research claims is a central, continuous, and laborious part of the scientific process. Credibility assessment strategies range from expert judgment to aggregating existing evidence to systematic replication efforts. Such assessments can require substantial time and effort. Research progress could be accelerated if there were rapid, scalable, accurate credibility indicators to guide attention and resource allocation for further assessment. The SCORE program is creating and validating algorithms to provide confidence scores for research claims at scale. To investigate the viability of scalable tools, teams are creating: a database of claims from papers in the social and behavioral …


Understanding And Predicting Retractions Of Published Work, Sai Ajay Modukuri, Sarah Rajtmajer, Anna Cinzia Squicciarini, Jian Wu, C. Lee Giles Jan 2021

Understanding And Predicting Retractions Of Published Work, Sai Ajay Modukuri, Sarah Rajtmajer, Anna Cinzia Squicciarini, Jian Wu, C. Lee Giles

Computer Science Faculty Publications

Recent increases in the number of retractions of published papers reflect heightened attention and increased scrutiny in the scientific process motivated, in part, by the replication crisis. These trends motivate computational tools for understanding and assessment of the scholarly record. Here, we sketch the landscape of retracted papers in the Retraction Watch database, a collection of 19k records of published scholarly articles that have been retracted for various reasons (e.g., plagiarism, data error). Using metadata as well as features derived from full-text for a subset of retracted papers in the social and behavioral sciences, we develop a random forest classifier …


Promoting Diversity In Teaching Cybersecurity Through Gicl, Yuming He, Wu He, Xiaohong Yuan, Li Yang, Theo Bastiaens (Ed.) Jan 2021

Promoting Diversity In Teaching Cybersecurity Through Gicl, Yuming He, Wu He, Xiaohong Yuan, Li Yang, Theo Bastiaens (Ed.)

Information Technology & Decision Sciences Faculty Publications

In summary, it is necessary to develop a diverse group of K-12 students’ interest and skills in cybersecurity as cyber threats continue to grow. Evidence shows that educating the next generation of cyber workers is a crucial job that should begin in elementary school. To ensure the effectiveness of cybersecurity education and equity at the K-12 level, teachers must create thoughtful plans for considering communities’ interests and needs, and to continually reconsider what’s working and how to adjust our strategies, approaches, design, and research plan to meet their specific needs, challenges, and strengths, particularly with students from under-served and underrepresented …


Deapsecure Computational Training For Cybersecurity Students: Improvements, Mid-Stage Evaluation, And Lessons Learned, Wirawan Purwanto, Yuming He, Jewel Ossom, Qiao Zhang, Liuwan Zhu, Karina Arcaute, Masha Sosonkina, Hongyi Wu Jan 2021

Deapsecure Computational Training For Cybersecurity Students: Improvements, Mid-Stage Evaluation, And Lessons Learned, Wirawan Purwanto, Yuming He, Jewel Ossom, Qiao Zhang, Liuwan Zhu, Karina Arcaute, Masha Sosonkina, Hongyi Wu

University Administration Publications

DeapSECURE is a non-degree computational training program that provides a solid high-performance computing (HPC) and big-data foundation for cybersecurity students. DeapSECURE consists of six modules covering a broad spectrum of topics such as HPC platforms, big-data analytics, machine learning, privacy-preserving methods, and parallel programming. In the second year of this program, to improve the learning experience, we implemented a number of changes, such as grouping modules into two broad categories, "big-data" and "HPC"; creating a single cybersecurity storyline across the modules; and introducing post-workshop (optional) "hackshops." Two major goals of these changes are, firstly, to effectively engage students to maintain …


What Do Undergraduate Engineering Students And Preservice Teachers Learn By Collaborating And Teaching Engineering And Coding Through Robotics?, Jennifer Jill Kidd, Krishnanand Kaipa, Samuel J. Jacks, Stacie I. Ringleb, Pilar Pazos, Kristie Gutierrez, Orlando M. Ayala, Lillian Maria De Souza Almeida Jun 2020

What Do Undergraduate Engineering Students And Preservice Teachers Learn By Collaborating And Teaching Engineering And Coding Through Robotics?, Jennifer Jill Kidd, Krishnanand Kaipa, Samuel J. Jacks, Stacie I. Ringleb, Pilar Pazos, Kristie Gutierrez, Orlando M. Ayala, Lillian Maria De Souza Almeida

Teaching & Learning Faculty Publications

This research paper presents preliminary results of an NSF-supported interdisciplinary collaboration between undergraduate engineering students and preservice teachers. The fields of engineering and elementary education share similar challenges when it comes to preparing undergraduate students for the new demands they will encounter in their profession. Engineering students need interprofessional skills that will help them value and negotiate the contributions of various disciplines while working on problems that require a multidisciplinary approach. Increasingly, the solutions to today's complex problems must integrate knowledge and practices from multiple disciplines and engineers must be able to recognize when expertise from outside their field can …