Open Access. Powered by Scholars. Published by Universities.®

Education Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Computer Sciences

2019

Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 101

Full-Text Articles in Education

The Effects Of Automated Grading On Computer Science Courses At The University Of New Orleans, Jerod F A Dunbar Dec 2019

The Effects Of Automated Grading On Computer Science Courses At The University Of New Orleans, Jerod F A Dunbar

University of New Orleans Theses and Dissertations

This is a study of the impacts of the incorporation, into certain points of the Computer Science degree program at the University of New Orleans, of Course Management software with an Autograding component. The software in question, developed at Carnegie Mellon University, is called “Autolab.” We begin by dissecting Autolab in order to gain an understanding of its inner workings. We can then take out understanding of its functionality and apply that to an examination of fundamental changes to courses in the time since they incorporated the software. With that, we then compare Drop, Failure, Withdrawal rate data from before …


College Of Engineering Senior Design Competition Fall 2019, University Of Nevada, Las Vegas Dec 2019

College Of Engineering Senior Design Competition Fall 2019, University Of Nevada, Las Vegas

Fred and Harriet Cox Senior Design Competition Projects

Part of every UNLV engineering student’s academic experience, the senior design project stimulates engineering innovation and entrepreneurship. Each student in their senior year chooses, plans, designs, and prototypes a product in this required element of the curriculum. A capstone to the student’s educational career, the senior design project encourages the student to use everything learned in the engineering program to create a practical, real world solution to an engineering challenge. The senior design competition helps focus the senior students in increasing the quality and potential for commercial application for their design projects. Judges from local industry evaluate the projects on …


Smu Teaching Bank: Case Study Of A Multiyear Development Project Utilizing Student Resources, Alan Megargel, Terence P. C. Fan, Venky Shankararaman Dec 2019

Smu Teaching Bank: Case Study Of A Multiyear Development Project Utilizing Student Resources, Alan Megargel, Terence P. C. Fan, Venky Shankararaman

Research Collection School Of Computing and Information Systems

A domain refers to a business sector such as banking, healthcare, insurance, manufacturing etc. For an IS student, it is imperative that the domain knowledge includes a comprehension and understanding of business processes, technology and data related to the chosen domain. For example, when learning the retail banking domain, an IS student must have an understanding of the transactions concerned with retail banking such as fund transfers and loan repayments. The student must also gain a strong foothold in transaction fulfilment processes, the various application services that are used, the data that is transferred, etc. Teaching domain knowledge is very …


Augmenting Education: Ethical Considerations For Incorporating Artificial Intelligence In Education, Dana Remian Nov 2019

Augmenting Education: Ethical Considerations For Incorporating Artificial Intelligence In Education, Dana Remian

Instructional Design Capstones Collection

Artificial intelligence (AI) has existed in theory and practice for decades, but applications have been relatively limited in most domains. Recent developments in AI and computing have placed AI-enhanced applications in various industries and a growing number of consumer products. AI platforms and services aimed at enhancing educational outcomes and taking over administrative tasks are becoming more prevalent and appearing in more and more classrooms and offices. Conversations about the disruption and ethical concerns created by AI are occurring in many fields. The development of the technology threatens to outpace academic discussion of its utility and pitfalls in education, however. …


The Experiences Of African American Male Computer Science Majors In Two Year Colleges, Simone Brookins Jenkins Nov 2019

The Experiences Of African American Male Computer Science Majors In Two Year Colleges, Simone Brookins Jenkins

USF Tampa Graduate Theses and Dissertations

As the field of computer science grows and the computing science workforce demands more qualified workers, the United States workforce will require underrepresented minorities to help meet these demands. African American males are a demographic that can help meet this need but there are few of them pursuing computer science careers and successfully graduating with computer science degrees. The purpose of this qualitative study was to examine the experiences of African American male two-year college students who are in pursuit of a degree in computer science. My findings indicated that the study participants’ experiences such as positive interactions with faculty …


Evaluating Conversation Agent Impact On Student Experience In A Distance Education Course, Grover Walters Nov 2019

Evaluating Conversation Agent Impact On Student Experience In A Distance Education Course, Grover Walters

USF Tampa Graduate Theses and Dissertations

We explore the efficacy of conversation agents operating as an instructional aid in a distance education course. Two aspects of efficacy are considered—conversation agent impact on student perceptions of the experience, and how different design features of the agent affect student perceptions of engagement. Evaluation of the agent is accomplished by collecting data from 24 undergraduate participants separated into random groups. We conduct two rounds of mixedmethod evaluation. Between the two rounds, a modification to the agent occurs based on the outcome of the first evaluation. Findings include limitations related to phrasing and data persistence features of the design that …


Characterizing Instructional Leader Interactions In A Social Learning Management System Using Social Network Analysis, Orven E. Llantos, Ma. Regina Justina E. Estuar Nov 2019

Characterizing Instructional Leader Interactions In A Social Learning Management System Using Social Network Analysis, Orven E. Llantos, Ma. Regina Justina E. Estuar

Department of Information Systems & Computer Science Faculty Publications

Online learning environments are designed with specific users and respective roles in mind. However, for social systems that thrive on the interaction between and among users, important features are developed based on relationships that evolve over time. Typical learning management systems are designed with the teacher and the student as primary users of the system. my.eskwela is a social learning management system that has been designed for use in public schools in the Philippines with the inclusion of an additional user, the school administrator. Although administrators influence on student learning through mediated effects of instructional leadership, pieces of literature are …


Read And Publish: What Can Libraries Expect?, Josh Horowitz Oct 2019

Read And Publish: What Can Libraries Expect?, Josh Horowitz

Charleston Library Conference

The author provides a publisher's perspective on the challenges and opportunities faced by a mid-sized society in navigating the current transition to open access licensing models.


Proposal For A Joint Cybersecurity And Information Technology Management Program, Christopher Simpson, Debra Bowen, William Reid, James Juarez Oct 2019

Proposal For A Joint Cybersecurity And Information Technology Management Program, Christopher Simpson, Debra Bowen, William Reid, James Juarez

KSU Proceedings on Cybersecurity Education, Research and Practice

Cybersecurity and Information Technology Management programs have many similarities and many similar knowledge, skills, and abilities are taught across both programs. The skill mappings for the NICE Framework and the knowledge units required to become a National Security Agency and Department of Homeland Security Center of Academic Excellence in Cyber Defense Education contain many information technology management functions. This paper explores one university’s perception on how a joint Cybersecurity and Information Technology Management program could be developed to upskill students to be work force ready.


Adversarial Thinking: Teaching Students To Think Like A Hacker, Frank Katz Oct 2019

Adversarial Thinking: Teaching Students To Think Like A Hacker, Frank Katz

KSU Proceedings on Cybersecurity Education, Research and Practice

Today’s college and university cybersecurity programs often contain multiple laboratory activities on various different hardware and software-based cybersecurity tools. These include preventive tools such as firewalls, virtual private networks, and intrusion detection systems. Some of these are tools used in attacking a network, such as packet sniffers and learning how to craft cross-site scripting attacks or man-in-the-middle attacks. All of these are important in learning cybersecurity. However, there is another important component of cybersecurity education – teaching students how to protect a system or network from attackers by learning their motivations, and how they think, developing the students’ “abilities to …


A University-Based Forensics Training Center As A Regional Outreach, Education, And Research Activity, Rayford B. Vaughn, David A. Dampier Oct 2019

A University-Based Forensics Training Center As A Regional Outreach, Education, And Research Activity, Rayford B. Vaughn, David A. Dampier

David Dampier

This paper describes a university-based Forensics Training Center (FTC) established by a Department of Justice grant for the purpose of improving the ability of state and local law enforcement in the Southeastern part of the United States to address the rising incidence of computer based crime. The FTC effort is described along with supporting evidence of its need. The program is not only a service activity, but also contributes to the Mississippi State University (MSU) security program pedagogy, and research effort.


Integrating Mathematics And Biology In The Classroom: A Compendium Of Case Studies And Labs, Becky Sanft, Anne Walter Oct 2019

Integrating Mathematics And Biology In The Classroom: A Compendium Of Case Studies And Labs, Becky Sanft, Anne Walter

Annual Symposium on Biomathematics and Ecology Education and Research

No abstract provided.


Experiences Of Using Intelligent Virtual Assistants By Visually Impaired Students In Online Higher Education, Michele R. Forbes Oct 2019

Experiences Of Using Intelligent Virtual Assistants By Visually Impaired Students In Online Higher Education, Michele R. Forbes

USF Tampa Graduate Theses and Dissertations

In today’s world, the attainment of higher education impacts the acquisition of competitive employment and, thus, quality of life. As a group, persons with disabilities continually fall behind others in such academic progress, requiring new efforts to support their earning of advanced credentials. Though highly beneficial for these individuals, obtaining a degree comes with elevated levels of stress. As enrollment of students with disabilities grows in all formats of higher education, those involved must understand the stress endured by these students and how to diminish it. Theories speculate that technology, such as intelligent virtual assistants, may be a viable tool …


Exercises Integrating High School Mathematics With Robot Motion Planning, Ronald I. Greenberg, George K. Thiruvathukal Oct 2019

Exercises Integrating High School Mathematics With Robot Motion Planning, Ronald I. Greenberg, George K. Thiruvathukal

Computer Science: Faculty Publications and Other Works

This paper presents progress in developing exercises for high school students incorporating level-appropriate mathematics into robotics activities. We assume mathematical foundations ranging from algebra to precalculus, whereas most prior work on integrating mathematics into robotics uses only very elementary mathematical reasoning or, at the other extreme, is comprised of technical papers or books using calculus and other advanced mathematics. The exercises suggested are relevant to any differerential-drive robot, which is an appropriate model for many different varieties of educational robots. They guide students towards comparing a variety of natural navigational strategies making use of typical movement primitives. The exercises align …


Soul Of Cafecs, Lucia Dettori, Steven Mcgee, Ron Greenberg, Dale Reed, Don Yanek, Andrew Rasmussen Oct 2019

Soul Of Cafecs, Lucia Dettori, Steven Mcgee, Ron Greenberg, Dale Reed, Don Yanek, Andrew Rasmussen

Computer Science: Faculty Publications and Other Works

No abstract provided.


Cloud Computing Architecture For Elearning Systems In Secondary Schools In Tanzania, Kennedy F. Mwakisole, Mussa M. Kissaka Dr, Joel S. Mtebe Phd Oct 2019

Cloud Computing Architecture For Elearning Systems In Secondary Schools In Tanzania, Kennedy F. Mwakisole, Mussa M. Kissaka Dr, Joel S. Mtebe Phd

The African Journal of Information Systems

In recent years, schools have been investing heavily on information and communications technology (ICT) infrastructure to implement eLearning systems to enhance the quality of education in secondary schools in Tanzania. The majority of these systems are implemented using a traditional web-based eLearning approach on school premises which is costly and limits usage due to lack of scalability and flexibility. Consequently, many schools have started adopting cloud computing as a solution. However, this adaption depends on well-defined cloud eLearning architecture. This study proposed cloud architecture for implementing an eLearning system in secondary schools in Tanzania by adopting various layers proposed in …


Cybersecurity Education: The Quest To Building Bridge Skills, Andy Igonor, Raymond L. Forbes, Jonathan Mccombs Aug 2019

Cybersecurity Education: The Quest To Building Bridge Skills, Andy Igonor, Raymond L. Forbes, Jonathan Mccombs

All Faculty and Staff Scholarship

Today's employers differ in what skills and abilities they believe make for a competent cybersecurity professional; however, they concur on the importance of technical and soft skills, which we collectively refer to as "bridge skills" - in other words, skills needed to bridge employer needs and what higher education teaches. Higher education, on the other hand favors producing a holistic and rounded graduate, with soft skills incorporated into the first one or two years of study. Somewhere between these two dichotomies is a missing link which currently manifests as higher education not meeting the needs of industry relative to cybersecurity …


Impact Of Robotic Challenges On Fifth Grade Problem Solving, Julie Rankin Aug 2019

Impact Of Robotic Challenges On Fifth Grade Problem Solving, Julie Rankin

Department of Teaching, Learning, and Teacher Education: Dissertations, Theses, and Student Research

This action research project was designed to investigate the impact of educational robotics in a fifth grade rural classroom. The integration of science, technology, engineering, and math in education (STEM) has sparked an increase of robotics in the classroom. The purpose of the study was to determine if problem-solving skills can be impacted through continuing involvement with challenges using various educational robotics and programming tools. The study sought to answer two research questions: (1) How does the introduction of robotics challenges in a fifth-grade classroom impact students’ problem solving skills? (2) How do robotics in the classroom impact student interest …


Comparing Security Self-Efficacy Amongst College Freshmen And Senior, Female And Male Cybersecurity Students, Lane H. Melton Aug 2019

Comparing Security Self-Efficacy Amongst College Freshmen And Senior, Female And Male Cybersecurity Students, Lane H. Melton

Doctoral Dissertations and Projects

This study sought to determine if there was a difference in the self-efficacy of freshman and senior, female and male Cybersecurity students relating to threats associated with various information systems. The design for this quantitative study was non-experimental, causal-comparative and known as group comparison used to determine if there was a causal relationship between variables. The method used to make that determination utilized a self-efficacy survey developed by Phelps (2005), to identify the independent variables specific level of self-efficacy. Research was conducted at a small, southern university with total of 33 participants. Each student was enrolled in the Computer Science …


Cybersecurity Education In Utah High Schools: An Analysis And Strategy For Teacher Adoption, Cariana June Cornel Aug 2019

Cybersecurity Education In Utah High Schools: An Analysis And Strategy For Teacher Adoption, Cariana June Cornel

Theses and Dissertations

The IT Education Specialist for the USBE, Brandon Jacobson, stated:I feel there is a deficiency of and therefore a need to teach Cybersecurity.Cybersecurity is the “activity or process, ability or capability, or state whereby information and communications systems and the information contained therein are protected from and/or defended against damage, unauthorized use or modification, or exploitation” (NICE, 2018). Practicing cybersecurity can increase awareness of cybersecurity issues, such as theft of sensitive information. Current efforts, including but not limited to, cybersecurity camps, competitions, college courses, and conferences, have been created to better prepare cyber citizens nationwide for such cybersecurity occurrences. In …


Securing The Human: Broadening Diversity In Cybersecurity, Mohammad Azhar, Sajal Bhatia, Greg Gagne, Chadi Kari, Joseph Maguire, Xenia Montrouidou, Liviana Tudor, David Vosen, Timothy T. Yuen Jul 2019

Securing The Human: Broadening Diversity In Cybersecurity, Mohammad Azhar, Sajal Bhatia, Greg Gagne, Chadi Kari, Joseph Maguire, Xenia Montrouidou, Liviana Tudor, David Vosen, Timothy T. Yuen

School of Computer Science & Engineering Faculty Publications

Recent global demand for cybersecurity professionals is promising, with the U.S. job growth rate at 28%, three times the national average [1]. Lacking qualified applicants, many organizations struggle to fill open positions [2]. In a global survey, 2,300 security managers reported that 59% of their security positions were unfilled, although 82% anticipated cyberattacks to their systems [3]. At the same time, the cybersecurity field is broadening, not only in technical concepts but also in human factors, business processes, and international law. The field has not become culturally diversified, however. Professionals hired in 2018 included only 24.9% women, 12.3% African Americans, …


Mathematics And Programming Exercises For Educational Robot Navigation, Ronald I. Greenberg Jul 2019

Mathematics And Programming Exercises For Educational Robot Navigation, Ronald I. Greenberg

Computer Science: Faculty Publications and Other Works

This paper points students towards ideas they can use towards developing a convenient library for robot navigation, with examples based on Botball primitives, and points educators towards mathematics and programming exercises they can suggest to students, especially advanced high school students.


An Exploration Of Turkish Kindergarten Early Career Stage Teachers’ Technology Beliefs And Practices, Ozge Ozel Jul 2019

An Exploration Of Turkish Kindergarten Early Career Stage Teachers’ Technology Beliefs And Practices, Ozge Ozel

USF Tampa Graduate Theses and Dissertations

The purpose of this study was to explore Turkish kindergarten early career stage teachers’ self-efficacy beliefs towards technology and their technology integration practices in their classrooms by answering: What are self-efficacy beliefs of Turkish kindergarten early career stage teachers towards technology? How do Turkish kindergarten early career teachers integrate technology into their classrooms’ instructions? The study was designed as a qualitative multiple case study and guided by Bandura’s (1986) social cognitive theory and Mishra and Koehler’s (2006) TPACK conceptual framework. I conducted this study in Istanbul, where is the most crowded and metropolitan city in Turkey. The schools were chosen …


Using Forensics To Introduce Ir Spectroscopy & Molecular Modeling, Joseph T. Golab Jul 2019

Using Forensics To Introduce Ir Spectroscopy & Molecular Modeling, Joseph T. Golab

Faculty Publications & Research

A student activity is reported that analyzes “medical evidence” with experimental and computational methods. The lesson demonstrates benefits of solving practical problems with integrated tools.


An Intelligent Platform With Automatic Assessment And Engagement Features For Active Online Discussions, Michelle L. F. Cheong, Yun-Chen Chen, Bing Tian Dai Jul 2019

An Intelligent Platform With Automatic Assessment And Engagement Features For Active Online Discussions, Michelle L. F. Cheong, Yun-Chen Chen, Bing Tian Dai

Research Collection School Of Computing and Information Systems

In a universitycontext, discussion forums are mostly available in Learning and ManagementSystems (LMS) but are often ineffective in encouraging participation due topoorly designed user interface and the lack of motivating factors toparticipate. Our integrated platform with the Telegram mobile app and aweb-based forum, is capable of automatic thoughtfulness assessment of questionsand answers posted, using text mining and Natural Language Processing (NLP)methodologies. We trained and applied the Random Forest algorithm to provideinstant thoughtfulness score prediction for the new posts contributed by thestudents, and prompted the students to improve on their posts, thereby invokingdeeper thinking resulting in better quality contributions. In addition, …


Applying Case-Based Learning For A Postgraduate Software Architecture Course, Eng Lieh Ouh, Yunghans Irawan Jul 2019

Applying Case-Based Learning For A Postgraduate Software Architecture Course, Eng Lieh Ouh, Yunghans Irawan

Research Collection School Of Computing and Information Systems

Software architecture remains a difficult subject for learners to grasp and for educators to teach given its level of abstraction. On the other hand, case-based learning (CBL) is a popular teaching approach used across disciplines especially in business, medicine and law where students work in groups apply their knowledge to solve real-world case studies, or scenarios using their reasoning skills and existing theoretical knowledge. In this paper, we provide how we apply case-based learning to address the challenge in teaching a postgraduate software architecture course. Our learners are postgraduate students taking a master’s program in software engineering. We first describe …


Outcasts – In Search Of Identity, Syed Hasan Haider Jun 2019

Outcasts – In Search Of Identity, Syed Hasan Haider

MSJ Capstone Projects

The idea for this documentary came from a story published in the express tribune which talked about the people who are unable to vote in 2018 elections due to having Computerized National Identity Cards (CNICs) in the Ibrahim Hyderi locality in Karachi.

Not having a CNIC in Pakistan means that you are not able to participate in civic life and also not subscribe to basic facilitates like housing, water, gas and employment.

This documentary film looks at different cases and through the experience of some journalists what it is like to live as an undocumented citizen. The film also explores …


”Cyberworld” As A Theme For A University-Wide First-Year Common Course, Kristen Przyborski, Frank Breitinger, Lauren Beck, Ronald S. Harichandran Jun 2019

”Cyberworld” As A Theme For A University-Wide First-Year Common Course, Kristen Przyborski, Frank Breitinger, Lauren Beck, Ronald S. Harichandran

Engineering and Applied Science Education Faculty Publications

Nowadays we all live in a cyber world and use the internet for emailing, banking, streaming video, shopping, reading news, or other activities. Given all the time people spend online, it is important that all students (regardless of their major) learn some basics about living in a cyber world, e.g., strategies for online safety, impact of artificial intelligence, digital forensics or ancestry.com. To facilitate students from many majors to learn about important issues related to the internet, eight faculty from a variety of disciplines at the University of New Haven integrated the theme of Cyber World into our team-taught, first-year …


Closing Banquet Eulogies, Russell Howell, C. Ray Rosentrater Jun 2019

Closing Banquet Eulogies, Russell Howell, C. Ray Rosentrater

ACMS Conference Proceedings 2019

A tribute to David Lay; A tribute to John Roe


A Holistic Approach For Enhancing Distributed Education With Multi-Campus Course Delivery Methods, Mahmoud K. Quweider, Ala Qubbaj, Liyu Zhang, Fitratullah Khan, Hansheng Lei Jun 2019

A Holistic Approach For Enhancing Distributed Education With Multi-Campus Course Delivery Methods, Mahmoud K. Quweider, Ala Qubbaj, Liyu Zhang, Fitratullah Khan, Hansheng Lei

Computer Science Faculty Publications and Presentations

To create an emerging research institution, a regional university was created that spans multiple campuses within a radius of more than one hundred miles by merging at least three current institutions. The merge allowed the university to pool its human and technical resources. Students can now pursue new degrees that were not available before at one campus or another, take a newly available technical or specialty courses, and even select their own preferred professor when a course is offered by many faculty. In order to serve students at multiple campuses that are geographically far a part, the university instituted policies …