Elodie Billionniere, M. Pena, Jenny Chen, Kennashka Desilva
{"title":"Leveling Up: EmTech Education Providing New Pathway Opportunities in IT for Women at Any Stage of Their Careers","authors":"Elodie Billionniere, M. Pena, Jenny Chen, Kennashka Desilva","doi":"10.1145/3537674.3555785","DOIUrl":"https://doi.org/10.1145/3537674.3555785","url":null,"abstract":"Tech industry, especially, some areas within tech fields, such as Emerging Technology (EmTech), like cybersecurity, machine learning, AI, and cloud computing, are expected to experience immense increases in job opportunities in coming years. While a variety of solutions are necessary to address the growing workforce needs in the EmTech industry, one of the largest untapped talent pools is women and underrepresented students. The panel postulates the labor needs for more women in Tech could be met by actively nurturing and enticing recent graduates, early career professionals, reskilled and returning career professionals. This panel offers a discussion platform that can provide insight into the stories of Women in EmTech and further research how to improve diversity in the technology education and industry.","PeriodicalId":201428,"journal":{"name":"Proceedings of the 23rd Annual Conference on Information Technology Education","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125249357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Comparison of Students’ Learning Behaviors and Performance Among Pre, During and Post COVID-19 Pandemic","authors":"Yong Zheng, Shuai Zheng","doi":"10.1145/3537674.3554753","DOIUrl":"https://doi.org/10.1145/3537674.3554753","url":null,"abstract":"The advent of the COVID-19 pandemic fundamentally changed humans’ lifestyle, especially in the education sector. Educators and learners have to shift from traditional face-to-face learning to online or e-learning. Several novel online learning technologies were promoted during pandemic, and the corresponding advantages and disadvantages were analyzed and pointed out by existing research. However, there is limited research which compare students’ learning behaviors or performance among pre, during and post pandemic periods. In this paper, we performed a quantitative analysis and comparison to reveal the patterns on students’ learning behaviors or performance during different pandemic periods in information technology educations. More specifically, students’ behaviors on assignment submissions and their final grades were extracted and analyzed for the purpose of quantitative comparison. Our experimental results discover significant impacts on students’ learning by the COVID-19 pandemic in information technology educations, which may further benefit different stakeholders in the educational community in their future development.","PeriodicalId":201428,"journal":{"name":"Proceedings of the 23rd Annual Conference on Information Technology Education","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115492684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Straight From the Human Factors Professionals’ Mouth: The Need to Teach Human Factors in Cybersecurity","authors":"C. Nobles, Margaret Cunningham, Nikki Robinson","doi":"10.1145/3537674.3555782","DOIUrl":"https://doi.org/10.1145/3537674.3555782","url":null,"abstract":"Colleges and universities are vital for integrating the human factors discipline in cybersecurity courses. Human errors, limitations, and weaknesses contribute to data breaches, ransomware attacks, and cyber-attacks. The cybersecurity community struggles to leverage human factors as a scientific discipline to eradicate human-related issues. Problems regarding the human element in cybersecurity require curricula focusing on the scientific aspects of human factors to teach human factors principles. As people and technology are increasingly interdependent, students interested in pursuing careers in technology must have a foundational understanding of people and their interactions with technology. While human factors is the discipline, human factors engineering is the work of leveraging human factors principles to improve the integration between humans and systems. Through various venues, educational initiatives, and research, academia can systematically link the science of human factors with cybersecurity. Colleges and universities are a centric node to educate industry, academia, and government leaders on the value of human factors engineering in cybersecurity. Through scholarly research, partnerships with government and industry, and a developing human factors curriculum, academia can influence business decision-makers to leverage human factors engineering with the same rigor and affinity for cybersecurity, software, and network engineering. This panel serves as a platform to increase awareness and the significance of integrating human factors courses into cybersecurity curricula that are taught by faculty members with proper credentials and industry experience.","PeriodicalId":201428,"journal":{"name":"Proceedings of the 23rd Annual Conference on Information Technology Education","volume":"206 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115739548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Beomjin Kim, M. Coppola, Thomas Bolinger, Guoping Wang, Michelle B. Parker
{"title":"Summer Computing Camp to Compare and Contrast CS/IT/CE Programs","authors":"Beomjin Kim, M. Coppola, Thomas Bolinger, Guoping Wang, Michelle B. Parker","doi":"10.1145/3537674.3555796","DOIUrl":"https://doi.org/10.1145/3537674.3555796","url":null,"abstract":"High school students need to better understand the differences between majors in computing fields. Misunderstanding the differences may lead students to drop out or switch majors, harming retention rates and degree completion times. This interdisciplinary team is developing a week-long camp curriculum for high school students to promote success in selecting a computing major. Evaluation methods for the program aim to identify which elements are most impactful in helping participants choose disciplines of study; and the camp will assist students in effectively preparing for college education based on their personal preferences, experiences, and high school coursework.","PeriodicalId":201428,"journal":{"name":"Proceedings of the 23rd Annual Conference on Information Technology Education","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115592449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"National Cybersecurity Curriculum Task Force: How you can contribute to and benefit from high-quality, high-impact cybersecurity curriculum","authors":"Cara Tang, Seth T. Hamman, S. Kaza, Blair Taylor","doi":"10.1145/3537674.3555795","DOIUrl":"https://doi.org/10.1145/3537674.3555795","url":null,"abstract":"Funded by the NSA through the NCAE-C program, the mission of the National Cybersecurity Curriculum Task Force is to catalog and create high-quality and relevant curricula on emerging cybersecurity topics, mapping to curricular and workforce guidelines, and make them freely available. This lightning talk will share the progress of the project so far, point the audience to where they can find vetted cybersecurity curriculum materials, and offer opportunities to contribute to the project.","PeriodicalId":201428,"journal":{"name":"Proceedings of the 23rd Annual Conference on Information Technology Education","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127174802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"It’s Great to Be Back: An Experience Report Comparing Course Satisfaction Surveys Before, During and After Pandemic","authors":"Luis Corral, Ilenia Fronza","doi":"10.1145/3537674.3554755","DOIUrl":"https://doi.org/10.1145/3537674.3554755","url":null,"abstract":"University and college level course satisfaction is usually appraised through feedback surveys. Course satisfaction items and comments commonly orbit around course content and quality of teaching or teaching staff abilities. With the COVID-19 outbreak, teaching strategies and course delivery tools were forced to change, bringing up considerations that previously were not necessarily regarded as key elements for course evaluation. After almost two years of fully remote courses, the declining of the pandemic allowed several institutions to return to in-person activities, bringing back the traditional in-person course format. With the closure of the first courses carried out again in person, it is possible to review course satisfaction surveys in a post-pandemic environment, and gain insight about the trends, changes, and evolution brought by these difficult times. In this experience report, we discuss the results of the course satisfaction survey of an undergraduate Software Engineering course through a time span of three years that includes pre-pandemic, pandemic, and post-pandemic conditions. Results show that even though by the beginning of the pandemic the course satisfaction level were kept high, as the pandemic aged there was a mild declining trend on course satisfaction and general student engagement. These indicators came back to their traditional levels as the institution brought back in-person courses. The goal of this experience report is to call attention to the production of research works that assist on understanding what are the elements that were relevant for course satisfaction before and during the pandemic, how these prevailed as after the outbreak, and what indicators returned to their original, pre-pandemic standards.","PeriodicalId":201428,"journal":{"name":"Proceedings of the 23rd Annual Conference on Information Technology Education","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122914948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards Education 5.0: Instruction with Learners in the Loop","authors":"P. Seeling, Scott Roberts, Jennifer L. Weible","doi":"10.1145/3537674.3555793","DOIUrl":"https://doi.org/10.1145/3537674.3555793","url":null,"abstract":"Based on the current view of Education 4.0 and Industry 4.0 and developments in Industry 5.0, we extrapolate onto the resulting advances that might be following in Education 5.0: Both are presumed to focus on a reintegration of human factors and place human actors into controlling loops, which we introduce here.","PeriodicalId":201428,"journal":{"name":"Proceedings of the 23rd Annual Conference on Information Technology Education","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129484126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Dangerous Infodemic: An Examination of the Impact Social Media Misinformation has on COVID-19 Vaccination Status","authors":"Laura Crouse, M. Dupuis","doi":"10.1145/3537674.3554754","DOIUrl":"https://doi.org/10.1145/3537674.3554754","url":null,"abstract":"The concept of misinformation is not new, but the digital age has created a new environment for the rapid spreading of misinformation. The overabundance of information that is available online has made it challenging for individuals to identify trustworthy and reliable sources. Social media in particular provides a global network connecting users, and the information there is created by the users themselves; therefore, it can be inaccurate and subjective. Throughout the COVID-19 pandemic, social media sites have acted as facilitators and multipliers of COVID-19-related misinformation. This misinformation can have a significant impact on global health by impacting individuals’ behaviors and has the potential to cause significant harm. In this paper, we explore how COVID-19 misinformation found via social media impacts individuals’ decisions to get vaccinated against COVID-19. The results from our study suggest that as one’s beliefs in misinformation and conspiracies related to COVID-19 increase, so does their decision to not obtain a vaccine.","PeriodicalId":201428,"journal":{"name":"Proceedings of the 23rd Annual Conference on Information Technology Education","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130156649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IT Baccalaureate Programs and Program Leaders in the U.S.: A Profile, Characteristics, and Perceptions","authors":"Nancy L. Martin","doi":"10.1145/3537674.3554746","DOIUrl":"https://doi.org/10.1145/3537674.3554746","url":null,"abstract":"The number of information technology baccalaureate programs continues to grow to meet the demand for rapid growth in IT occupations. With the growth of a relatively new academic discipline, it is important to identify its players, namely IT faculty and administrators, and the programmatic landscape. To gather data about IT programs, faculty, and administrators, a survey was conducted in spring 2021. This paper is presents survey data related to the profiles and perceptions of IT program leaders and characteristics of IT baccalaureate programs in the U.S.","PeriodicalId":201428,"journal":{"name":"Proceedings of the 23rd Annual Conference on Information Technology Education","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130523410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Introducing Zero Trust in a Cybersecurity Course","authors":"Xinli Wang, Samah S. Mansour, M. El-Said","doi":"10.1145/3537674.3555779","DOIUrl":"https://doi.org/10.1145/3537674.3555779","url":null,"abstract":"Zero trust (ZT) is a conceptual and architectural model for cybersecurity teams to design networks into secure micro-perimeters and strengthen data security by systematically integrating state-of-the-art technology, risk management, and threat intelligence. ZT has recently gained momentum in the industry to defend against lateral movement of malicious actors in today’s borderless networks. The United States 2021 President Executive Order requires the federal government must adopt security best practice and advance toward a zero trust architecture (ZTA). However, it is not a trivial task to implement a ZTA due to its novelty and complexity. We need to understand what ZTA is to take the advantage of it. Therefore, there is a need to introduce the fundamental concepts, principles, and architectures of ZT in cybersecurity courses at a college to better prepare our new cybersecurity professionals for their careers. We have introduced ZT in a cybersecurity course for senior undergraduates and another course for graduate students. This article provides an overview of the materials we have used to introduce ZT in both courses, including the problems in a traditional perimeter-based security model and how these problems can be either resolved or mitigated with a ZT security model. We expect our work will serve as a good reference for educators to introduce ZT security model in a cybersecurity course.","PeriodicalId":201428,"journal":{"name":"Proceedings of the 23rd Annual Conference on Information Technology Education","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124972473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}