Proceedings of the 14th annual ACM SIGITE conference on Information technology education最新文献

筛选
英文 中文
Computing is not a rock band: student understanding of the computing disciplines 计算机不是摇滚乐队:学生对计算机学科的理解
F. Uzoka, Randy W. Connolly, Marc Schroeder, Namrata Khemka, Janet Miller
{"title":"Computing is not a rock band: student understanding of the computing disciplines","authors":"F. Uzoka, Randy W. Connolly, Marc Schroeder, Namrata Khemka, Janet Miller","doi":"10.1145/2512276.2512291","DOIUrl":"https://doi.org/10.1145/2512276.2512291","url":null,"abstract":"This paper reports the initial findings of a multi-year study that is surveying major and non-major students' understanding of the different computing disciplines. This study is based on work originally conducted by Courte and Bishop-Clark from 2009 [7] and then repeated by Battig and Shariq in 2011 [3], but which uses a broadened study instrument that provided additional forms of analysis. Data was collected from 199 students from a single institution who were computer science, information systems/information technology and non-major students taking a variety of introductory computing courses. Results show that undergraduate computing students are more likely to rate tasks as being better fits to computer disciplines than are their non-major (NM) peers. Uncertainty among respondents did play a large role in the results and is discussed alongside implications for teaching and further research.","PeriodicalId":404291,"journal":{"name":"Proceedings of the 14th annual ACM SIGITE conference on Information technology education","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130087909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Embedding virtual meeting technology in classrooms: two case studies 在教室中嵌入虚拟会议技术:两个案例研究
Y. Wang, S. Lee
{"title":"Embedding virtual meeting technology in classrooms: two case studies","authors":"Y. Wang, S. Lee","doi":"10.1145/2512276.2512279","DOIUrl":"https://doi.org/10.1145/2512276.2512279","url":null,"abstract":"Innovative Internet applications coupled with improved videoconferencing capabilities have led to the proliferation of virtual meeting technology (VMT) in recent years. This paper aims to bring to light VMT as an effective classroom instructional tool, especially for IT education, and the possible ways to embed this technology in classroom settings in the form of two case studies of IT courses. The paper makes a unique contribution to the research by providing empirical evidence and indicative support for the successful application of VMT in different classroom settings and exemplifying the use of VMT as an effective instructional technology and an enabler of active learning.","PeriodicalId":404291,"journal":{"name":"Proceedings of the 14th annual ACM SIGITE conference on Information technology education","volume":"160 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115994185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Hands-on privacy labs 动手隐私实验室
Svetlana Peltsverger, Guangzhi Zheng
{"title":"Hands-on privacy labs","authors":"Svetlana Peltsverger, Guangzhi Zheng","doi":"10.1145/2512276.2512316","DOIUrl":"https://doi.org/10.1145/2512276.2512316","url":null,"abstract":"Laboratory exercises are important in all technical disciplines including information security. Development of reliable laboratory exercises covering rapidly changing topics takes a lot of time and resources. Instructors often prefer to cover an ever-changing topic using textbook materials and additional readings rather than developing a new lab exercise. Privacy is one of those topics. This paper presents a virtual environment developed for hands-on exercises that will complement theoretical coverage of privacy topics. In these exercises, students will investigate technical aspects of privacy such as user tracking, data aggregation, and various tools such as Firefox add-on Collusion.","PeriodicalId":404291,"journal":{"name":"Proceedings of the 14th annual ACM SIGITE conference on Information technology education","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114766117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
COR: a new course framework based on elements of game design COR:基于游戏设计元素的新课程框架
Thomas E. Gibbons
{"title":"COR: a new course framework based on elements of game design","authors":"Thomas E. Gibbons","doi":"10.1145/2512276.2512292","DOIUrl":"https://doi.org/10.1145/2512276.2512292","url":null,"abstract":"Taking cues from the root causes of anxiety and poor student performance, a new course framework is developed using three key elements of game play. These game play elements are abstracted into an integrated teaching framework that gives students a choice in actions, options for cooperation and competition, and allows for revisions of work. Two case studies are examined that demonstrate how this framework can be implemented. One shows how this framework can be incorporated in the final project of a systems analysis and design course. The other shows how the framework can be used in a game design course to prepare students for different career paths.","PeriodicalId":404291,"journal":{"name":"Proceedings of the 14th annual ACM SIGITE conference on Information technology education","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134123443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Session details: Paper session J2: program change 会议细节:论文会议J2:程序更改
Craig Miller
{"title":"Session details: Paper session J2: program change","authors":"Craig Miller","doi":"10.1145/3254723","DOIUrl":"https://doi.org/10.1145/3254723","url":null,"abstract":"","PeriodicalId":404291,"journal":{"name":"Proceedings of the 14th annual ACM SIGITE conference on Information technology education","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133174741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Designing and building mobile pharmacy apps in a healthcare IT course 在医疗保健IT课程中设计和构建移动药房应用程序
Bonnie K. MacKellar, Maria Leibfried
{"title":"Designing and building mobile pharmacy apps in a healthcare IT course","authors":"Bonnie K. MacKellar, Maria Leibfried","doi":"10.1145/2512276.2512304","DOIUrl":"https://doi.org/10.1145/2512276.2512304","url":null,"abstract":"An important skill for students in information technology (IT) programs is that of collaborating with domain specialists while designing IT solutions. This is particularly true in healthcare IT, where usability errors can impact patients' health. Here, we describe a course project in which healthcare IT students collaborated with pharmacy students in a task analysis session aimed at specifying the steps in two common pharmacy scenarios. The healthcare IT students then went on to design and implement mobile apps, using AppInventor that were based on the two scenarios. The process benefited both groups of students; the pharmacy students learned about the IT design process, and the healthcare IT students learned about pharmacy workflow as well as communicating with healthcare specialists.","PeriodicalId":404291,"journal":{"name":"Proceedings of the 14th annual ACM SIGITE conference on Information technology education","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123781366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Performing robots: innovative interdisciplinary projects 表演机器人:创新的跨学科项目
D. Smarkusky, S. Toman, Peter Sutor, Christopher Hunt
{"title":"Performing robots: innovative interdisciplinary projects","authors":"D. Smarkusky, S. Toman, Peter Sutor, Christopher Hunt","doi":"10.1145/2512276.2512285","DOIUrl":"https://doi.org/10.1145/2512276.2512285","url":null,"abstract":"By challenging and engaging students in interdisciplinary projects, we provide a learning platform to enhance creativity, critical thinking and problem-solving skills, while promoting an innovation-oriented culture in academia. In this paper, we summarize interdisciplinary and undergraduate research projects in music and animation that integrate technologies from both disciplines to create unique and innovative projects. Iterative development coupled with various forms of visual and audio feedback enhanced the student learning experience with positive feedback from students. These efforts have resulted in the awarding of internal grant funding, interest in additional undergraduate research projects, and enhanced awareness of the application of technology to other disciplines.","PeriodicalId":404291,"journal":{"name":"Proceedings of the 14th annual ACM SIGITE conference on Information technology education","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127274294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Session details: Paper session H1: pedagogy 会议详情:论文会议H1:教育学
Chi Zhang
{"title":"Session details: Paper session H1: pedagogy","authors":"Chi Zhang","doi":"10.1145/3254720","DOIUrl":"https://doi.org/10.1145/3254720","url":null,"abstract":"","PeriodicalId":404291,"journal":{"name":"Proceedings of the 14th annual ACM SIGITE conference on Information technology education","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130016353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identifying information technology graduate-level programs 确定信息技术研究生水平的课程
B. Lunt, M. Q. Adams
{"title":"Identifying information technology graduate-level programs","authors":"B. Lunt, M. Q. Adams","doi":"10.1145/2512276.2512280","DOIUrl":"https://doi.org/10.1145/2512276.2512280","url":null,"abstract":"This paper follows up on a previous paper identifying four-year IT programs in the USA, and identifies graduate-level programs in IT within the four-year IT programs identified. The entrance requirements are also given.","PeriodicalId":404291,"journal":{"name":"Proceedings of the 14th annual ACM SIGITE conference on Information technology education","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126306203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Training cyber-defense and securing information assets using student blue teams 利用学生蓝队训练网络防御和保护信息资产
Scott J. Pack, D. Rowe
{"title":"Training cyber-defense and securing information assets using student blue teams","authors":"Scott J. Pack, D. Rowe","doi":"10.1145/2512276.2512290","DOIUrl":"https://doi.org/10.1145/2512276.2512290","url":null,"abstract":"In this paper, we discuss the creation of a student Blue Team to assist campus organizations with security incident response. We also explore approaches for establishing a relationship with university information technology staff, informing blue team members of professional and ethical responsibilities, and aiding system administrators with incident response and system hardening. Finally, we discuss the benefits to students taking part in these activities, as well as their contributions to improving an organizations security posture.","PeriodicalId":404291,"journal":{"name":"Proceedings of the 14th annual ACM SIGITE conference on Information technology education","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115380731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信