Proceedings of the 23rd Annual Conference on Information Technology Education最新文献

筛选
英文 中文
Building a Growth Mindset Toolkit as a Means Toward Developing a Growth Mindset for Faculty Interactions with Students In and Out of the Classroom: Building a Growth Mindset Toolkit for Faculty 建立一个成长心态工具包,作为培养教师在课堂内外与学生互动的成长心态的手段:为教师建立一个成长心态工具包
Proceedings of the 23rd Annual Conference on Information Technology Education Pub Date : 2022-09-21 DOI: 10.1145/3537674.3554750
Sharon Mason, E. Weeden, D. Bogaard
{"title":"Building a Growth Mindset Toolkit as a Means Toward Developing a Growth Mindset for Faculty Interactions with Students In and Out of the Classroom: Building a Growth Mindset Toolkit for Faculty","authors":"Sharon Mason, E. Weeden, D. Bogaard","doi":"10.1145/3537674.3554750","DOIUrl":"https://doi.org/10.1145/3537674.3554750","url":null,"abstract":"During the spring semester of the 2021 academic year, a group of faculty gathered as part of a Growth Mindset Faculty Community of Practice (GM-FCoP) to understand how to use a growth mindset to positively impact students in their courses, through mentoring and in daily conversations. Grounded in Carol Dweck's seminal works on theories of intelligence, a growth mindset asserts that skills can be developed over time and views challenges as opportunities for growth and future success. This contrasts with a fixed mindset which views skills as set at birth with little hope for development. This notion of a fixed mindset also contrasts with the essence of our work as faculty and educators where we strive daily to positively influence our students’ successes, learning and skill development. Yet, embracing a growth mindset over a fixed mindset can prove challenging. Learning about a growth mindset serves as an effective starting point for faculty, with next steps revolving around actively generating their own knowledge toward an overarching goal of applying the growth mindset concepts in their coursework as well as while mentoring students. This experience paper outlines the GM-FCoP's creation of a Growth Mindset Toolkit to serve as a resource for faculty as they foster and promote a growth mindset with students in formal settings such as in the classroom and in mentoring sessions, as well as informal settings such as office hours and general conversations and interactions. Faculty developed approaches for a growth mindset are highlighted along with leadership reflections and next steps.","PeriodicalId":201428,"journal":{"name":"Proceedings of the 23rd Annual Conference on Information Technology Education","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129389126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Availability of Voice Deepfake Technology and its Impact for Good and Evil 语音深度伪造技术的可用性及其对善恶的影响
Proceedings of the 23rd Annual Conference on Information Technology Education Pub Date : 2022-09-21 DOI: 10.1145/3537674.3554742
N. Amezaga, Jeremy Hajek
{"title":"Availability of Voice Deepfake Technology and its Impact for Good and Evil","authors":"N. Amezaga, Jeremy Hajek","doi":"10.1145/3537674.3554742","DOIUrl":"https://doi.org/10.1145/3537674.3554742","url":null,"abstract":"Artificial Intelligence and especially Machine Learning and Deep Learning techniques are increasingly populating today's technological and social landscape. These advancements have overwhelmingly contributed to the development of Speech Synthesis, also known as Text-To-Speech, where speech is artificially produced from text by means of computer technology [1]. But currently, there is a fundamental common drawback: unnatural, robotic and impersonal synthesized voices [2]. So, what happens when the robotic computer voice no longer sounds like a computer, but sounds like you? That's where Voice Cloning technology comes into play, which allows one to generate an artificial speech that resembles a targeted human voice. This new practice offers many benefits, but with its development, the generation of fake voices and videos, known as “deepfakes”, has risen, causing a loss of trust and greater fear towards technology [3]. In this way, the objective of this paper is to analyze the availability of voice deepfake technologies, its ease of construction and its impact for good and evil. We chose to focus on the educational field by implementing a “deepfake professor” via a survey of readily available voice deepfake technologies. The goal is then to demonstrate the potential capabilities for good and for evil that need to be considered with this technology, so we also conduct an analysis about the misuse, the current regulation, and the future of it. The results of the case study show that it is possible to clone someone's voice with a standard laptop, with no need of high-performance computing resources and based on just a few seconds of reference audio, which creates a superior user experience, but at the same time, reveals how easily can anyone have access to voice cloning. This expresses very well the importance of the new challenges opened by this potential technology and the need of safeguarding and regulation that future generations will have to deal with. There is no doubt that to understand the dynamics and impact of voice cloning and to reach more solid conclusions, future research is needed.","PeriodicalId":201428,"journal":{"name":"Proceedings of the 23rd Annual Conference on Information Technology Education","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126615076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Covert Eye Op App: An Offense Based Learning Approach Towards Developing Mobile Security Awareness and Interest in Cybersecurity Covert Eye Op App:一种基于攻击的学习方法,旨在培养移动安全意识和网络安全兴趣
Proceedings of the 23rd Annual Conference on Information Technology Education Pub Date : 2022-09-21 DOI: 10.1145/3537674.3554741
Ankur Chattopadhyay, Tyler Poe, Hoang Nguyen, Abel Tsegaye, Lolar Moua
{"title":"Covert Eye Op App: An Offense Based Learning Approach Towards Developing Mobile Security Awareness and Interest in Cybersecurity","authors":"Ankur Chattopadhyay, Tyler Poe, Hoang Nguyen, Abel Tsegaye, Lolar Moua","doi":"10.1145/3537674.3554741","DOIUrl":"https://doi.org/10.1145/3537674.3554741","url":null,"abstract":"This paper introduces a unique approach of teaching mobile security awareness at the high school level through a nifty offense-based learning strategy. Our approach involves creating an eye-opening experience for learners through our own mobile app, which has been designed and developed strategically, so that it requests unnecessary permissions from users and secretly exploits them in the form of a covert offensive operation, that includes recording their audio plus tracking their location. When the users notice this exploit activity orchestrated by our app and realize how their provided permissions have backfired on them, they get to learn first-hand about the ways in which a mobile app can misuse user permissions and covertly compromise user information. We have used this app to implement a hands-on experiential learning activity that is intended to teach users the importance of privacy and security in mobile devices by breaching them and making them self-discover issues with how users grant permissions to mobile apps. To our knowledge, there has been limited prior work that focuses on studying how offense-based user hacking techniques impact leaning of mobile security topics. In this paper, we attempt to address this research gap. This paper describes our mobile app, as well as our offense-based lesson plan, which has been used in several workshop sessions as a hands-on learning activity for the high school community since 2019. It also includes our learner assessment study that involves analysis of the quantitative and qualitive data that we have collected in the form of survey responses from different users at the high school level. The results from our study indicate that our offense-based learning approach using our unique app was able to successfully engage users and create a positive learning experience for the high school community by developing user awareness of mobile security related issues, plus overall interest in cybersecurity topics.","PeriodicalId":201428,"journal":{"name":"Proceedings of the 23rd Annual Conference on Information Technology Education","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115195381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Machine Teaching 机器教学
Proceedings of the 23rd Annual Conference on Information Technology Education Pub Date : 2022-09-21 DOI: 10.1145/3537674.3555781
Feng-Jen Yang
{"title":"Machine Teaching","authors":"Feng-Jen Yang","doi":"10.1145/3537674.3555781","DOIUrl":"https://doi.org/10.1145/3537674.3555781","url":null,"abstract":"While machine learning is catching most researchers’ eyes and has been practiced in many different aspects of our daily life, humans are equally benefited from machine teaching for a variety of purposes ranging from basic practical training to further advanced knowledge conveying. I, thus, am reemphasizing the teaching capabilities that machines could be equipped with. This paper is not for the purpose of coining a new term called ”machine teaching” which is contrary to ”machine learning”, but for the sake of restating a contrasting capability of machines that not only machines can learn but also can teach.","PeriodicalId":201428,"journal":{"name":"Proceedings of the 23rd Annual Conference on Information Technology Education","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116060726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Demystifying the Abstractness: Teaching Programming Concepts with Visualization 揭秘抽象性:用可视化方法教授编程概念
Proceedings of the 23rd Annual Conference on Information Technology Education Pub Date : 2022-09-21 DOI: 10.1145/3537674.3555786
Maryam Jalalitabar, Yang Wang
{"title":"Demystifying the Abstractness: Teaching Programming Concepts with Visualization","authors":"Maryam Jalalitabar, Yang Wang","doi":"10.1145/3537674.3555786","DOIUrl":"https://doi.org/10.1145/3537674.3555786","url":null,"abstract":"The abstract nature of programming concepts in CS/IT courses causes challenges for undergraduate students to grasp them. Visualization tools can mitigate this challenge by providing a ”what you see is what you get” experience. Given the diversity of the tools and the fast pace of software updates, it remains a question to select the best-fit tools that can be of current use for the respective programming concepts. This study aims at providing an assessment and classification of visualization tools based on four defined metrics which suggests a hybrid approach for selecting combination of visualization tools in teaching.","PeriodicalId":201428,"journal":{"name":"Proceedings of the 23rd Annual Conference on Information Technology Education","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126033575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Exploring the Internet of Things: Hands-On IoT Learning Mapped to the IT Pillars 探索物联网:映射到IT支柱的动手物联网学习
Proceedings of the 23rd Annual Conference on Information Technology Education Pub Date : 2022-09-21 DOI: 10.1145/3537674.3554757
Sharon Gumina, K. Patten
{"title":"Exploring the Internet of Things: Hands-On IoT Learning Mapped to the IT Pillars","authors":"Sharon Gumina, K. Patten","doi":"10.1145/3537674.3554757","DOIUrl":"https://doi.org/10.1145/3537674.3554757","url":null,"abstract":"The Internet of Things (IoT) is transforming our homes, businesses, and other enterprises into digital domains with a presence on the Internet. Increasingly enterprises are adopting IoT products, and they will employ individuals to design and support their IoT infrastructures, analyze their data and respond to the benefits and challenges of IoT. During the months of May and June 2022, the Department of Integrated Information Technology (IIT) within the College of Engineering and Computing at the University of South Carolina designed and taught a special topics course focused on IoT from the perspective of the IT Pillars – networking, programming, databases, HCI, and web systems. The course's focus on hands-on learning labs mapped to the IT Pillars distinguished this course from other IoT courses offered by the University of South Carolina. Student performance and feedback demonstrated that the course structure and content, including hands-on labs and projects, was an effective way to introduce students to IoT from the broad perspective of IT applied to real-world applications. Another benefit was a greater appreciation of the depth, scope, and impact of IoT on each of the IT Pillars and its importance in our curricula as we prepare students for their professional careers.","PeriodicalId":201428,"journal":{"name":"Proceedings of the 23rd Annual Conference on Information Technology Education","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121909811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Crowdsourcing Quality Concerns: An Examination of Amazon’s Mechanical Turk 众包质量问题:对亚马逊土耳其机器人的考察
Proceedings of the 23rd Annual Conference on Information Technology Education Pub Date : 2022-09-21 DOI: 10.1145/3537674.3555783
M. Dupuis, K. Renaud, R. Searle
{"title":"Crowdsourcing Quality Concerns: An Examination of Amazon’s Mechanical Turk","authors":"M. Dupuis, K. Renaud, R. Searle","doi":"10.1145/3537674.3555783","DOIUrl":"https://doi.org/10.1145/3537674.3555783","url":null,"abstract":"The use of crowdsourcing platforms, such as Amazon’s Mechanical Turk (MTurk), have been an effective and frequent tool for researchers to gather data from participants for a study. It provides a fast, efficient, and cost-effective method for acquiring large amounts of data for a variety of research projects, such as surveys that may be conducted to assess the use of information technology or to better understand cybersecurity perceptions and behaviors. While the use of such crowdsourcing platforms has gained both popularity and acceptance over the past several years, quality concerns remain a significant issue for the researcher. This paper examines these issues.","PeriodicalId":201428,"journal":{"name":"Proceedings of the 23rd Annual Conference on Information Technology Education","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128210116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Virtual Cybersecurity Camps: Lessons Learned 虚拟网络安全训练营:经验教训
Proceedings of the 23rd Annual Conference on Information Technology Education Pub Date : 2022-09-21 DOI: 10.1145/3537674.3555787
M. Dupuis, Joshua Bee, Ann Wright-Mockler
{"title":"Virtual Cybersecurity Camps: Lessons Learned","authors":"M. Dupuis, Joshua Bee, Ann Wright-Mockler","doi":"10.1145/3537674.3555787","DOIUrl":"https://doi.org/10.1145/3537674.3555787","url":null,"abstract":"Cybersecurity camps provide participants with an opportunity to learn about cybersecurity in a fun and safe environment. Traditionally, such camps, like many others, are held in-person. However, the COVID-19 pandemic created unique challenges and also an opportunity to counter those challenges—holding a cybersecurity camp virtually. While countless other camps, both cybersecurity-related and others, moved to a virtual environment so that such camps could continue to be held, this paper presents some lessons learned and suggestions that may be helpful to others deciding to hold a virtual camp in the future. Some of the lessons learned may be specific to a cybersecurity camp, but most would be applicable to a broad audience.","PeriodicalId":201428,"journal":{"name":"Proceedings of the 23rd Annual Conference on Information Technology Education","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133766343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bouncing Forward from COVID in Higher Education 高等教育从新冠疫情中复苏
Proceedings of the 23rd Annual Conference on Information Technology Education Pub Date : 2022-09-21 DOI: 10.1145/3537674.3554743
N. Stave, Jeremie Regnier, E. Shafer, E. Sobiesk, Malcolm Haynes
{"title":"Bouncing Forward from COVID in Higher Education","authors":"N. Stave, Jeremie Regnier, E. Shafer, E. Sobiesk, Malcolm Haynes","doi":"10.1145/3537674.3554743","DOIUrl":"https://doi.org/10.1145/3537674.3554743","url":null,"abstract":"This paper is a call to arms to bounce forward in the classroom as we emerge from the COVID crisis. The predominant return to in-person classes in higher education should not be a return to the same normal classroom conditions that existed prior to the pandemic. In the last 2+ years, we have come an extraordinarily long way in our abilities and in our inclinations to employ technologies and techniques in a blended classroom environment that truly improves the learning experience. In this paper, we call for and contribute to such an effort. Tying into the abundance of literature dealing with the COVID educational environment, we present our findings and ideas from carefully studying our own faculty. We summarize our overall findings as well as describe in detail three general categories that we believe hold great promise for improving the higher education classroom in the post-crisis era, namely digital chalkboards / screen sharing; remote participation and collaboration; and a paperless classroom. We argue that educators have an obligation and opportunity to not simply return to pre-crisis methods.","PeriodicalId":201428,"journal":{"name":"Proceedings of the 23rd Annual Conference on Information Technology Education","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130156981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Early IT Week: The Expansion of Stakeholder Engagement for a Growing Early IT High School Partnership Program 早期IT周:扩大利益相关者参与的早期IT高中合作伙伴计划
Proceedings of the 23rd Annual Conference on Information Technology Education Pub Date : 2022-09-21 DOI: 10.1145/3537674.3554749
Jenifer Soale, Kelly Broscheid
{"title":"Early IT Week: The Expansion of Stakeholder Engagement for a Growing Early IT High School Partnership Program","authors":"Jenifer Soale, Kelly Broscheid","doi":"10.1145/3537674.3554749","DOIUrl":"https://doi.org/10.1145/3537674.3554749","url":null,"abstract":"Expansion of the Early Information Technology ecosystem brings the challenge of supporting and engaging stakeholders while maintaining a high-quality partnership program. Utilizing the strategies outlined in the original design initiatives, the Early IT Support Team can effectively disseminate through infectious engagement, promote practice of skill, and seek continuous improvement as it sets goals to expand opportunities for students while developing the next generation of IT talent.","PeriodicalId":201428,"journal":{"name":"Proceedings of the 23rd Annual Conference on Information Technology Education","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129996708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信