F. Uzoka, Randy W. Connolly, Marc Schroeder, Namrata Khemka, Janet Miller
{"title":"Computing is not a rock band: student understanding of the computing disciplines","authors":"F. Uzoka, Randy W. Connolly, Marc Schroeder, Namrata Khemka, Janet Miller","doi":"10.1145/2512276.2512291","DOIUrl":"https://doi.org/10.1145/2512276.2512291","url":null,"abstract":"This paper reports the initial findings of a multi-year study that is surveying major and non-major students' understanding of the different computing disciplines. This study is based on work originally conducted by Courte and Bishop-Clark from 2009 [7] and then repeated by Battig and Shariq in 2011 [3], but which uses a broadened study instrument that provided additional forms of analysis. Data was collected from 199 students from a single institution who were computer science, information systems/information technology and non-major students taking a variety of introductory computing courses. Results show that undergraduate computing students are more likely to rate tasks as being better fits to computer disciplines than are their non-major (NM) peers. Uncertainty among respondents did play a large role in the results and is discussed alongside implications for teaching and further research.","PeriodicalId":404291,"journal":{"name":"Proceedings of the 14th annual ACM SIGITE conference on Information technology education","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130087909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Embedding virtual meeting technology in classrooms: two case studies","authors":"Y. Wang, S. Lee","doi":"10.1145/2512276.2512279","DOIUrl":"https://doi.org/10.1145/2512276.2512279","url":null,"abstract":"Innovative Internet applications coupled with improved videoconferencing capabilities have led to the proliferation of virtual meeting technology (VMT) in recent years. This paper aims to bring to light VMT as an effective classroom instructional tool, especially for IT education, and the possible ways to embed this technology in classroom settings in the form of two case studies of IT courses. The paper makes a unique contribution to the research by providing empirical evidence and indicative support for the successful application of VMT in different classroom settings and exemplifying the use of VMT as an effective instructional technology and an enabler of active learning.","PeriodicalId":404291,"journal":{"name":"Proceedings of the 14th annual ACM SIGITE conference on Information technology education","volume":"160 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115994185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hands-on privacy labs","authors":"Svetlana Peltsverger, Guangzhi Zheng","doi":"10.1145/2512276.2512316","DOIUrl":"https://doi.org/10.1145/2512276.2512316","url":null,"abstract":"Laboratory exercises are important in all technical disciplines including information security. Development of reliable laboratory exercises covering rapidly changing topics takes a lot of time and resources. Instructors often prefer to cover an ever-changing topic using textbook materials and additional readings rather than developing a new lab exercise. Privacy is one of those topics. This paper presents a virtual environment developed for hands-on exercises that will complement theoretical coverage of privacy topics. In these exercises, students will investigate technical aspects of privacy such as user tracking, data aggregation, and various tools such as Firefox add-on Collusion.","PeriodicalId":404291,"journal":{"name":"Proceedings of the 14th annual ACM SIGITE conference on Information technology education","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114766117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"COR: a new course framework based on elements of game design","authors":"Thomas E. Gibbons","doi":"10.1145/2512276.2512292","DOIUrl":"https://doi.org/10.1145/2512276.2512292","url":null,"abstract":"Taking cues from the root causes of anxiety and poor student performance, a new course framework is developed using three key elements of game play. These game play elements are abstracted into an integrated teaching framework that gives students a choice in actions, options for cooperation and competition, and allows for revisions of work. Two case studies are examined that demonstrate how this framework can be implemented. One shows how this framework can be incorporated in the final project of a systems analysis and design course. The other shows how the framework can be used in a game design course to prepare students for different career paths.","PeriodicalId":404291,"journal":{"name":"Proceedings of the 14th annual ACM SIGITE conference on Information technology education","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134123443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Paper session J2: program change","authors":"Craig Miller","doi":"10.1145/3254723","DOIUrl":"https://doi.org/10.1145/3254723","url":null,"abstract":"","PeriodicalId":404291,"journal":{"name":"Proceedings of the 14th annual ACM SIGITE conference on Information technology education","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133174741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Designing and building mobile pharmacy apps in a healthcare IT course","authors":"Bonnie K. MacKellar, Maria Leibfried","doi":"10.1145/2512276.2512304","DOIUrl":"https://doi.org/10.1145/2512276.2512304","url":null,"abstract":"An important skill for students in information technology (IT) programs is that of collaborating with domain specialists while designing IT solutions. This is particularly true in healthcare IT, where usability errors can impact patients' health. Here, we describe a course project in which healthcare IT students collaborated with pharmacy students in a task analysis session aimed at specifying the steps in two common pharmacy scenarios. The healthcare IT students then went on to design and implement mobile apps, using AppInventor that were based on the two scenarios. The process benefited both groups of students; the pharmacy students learned about the IT design process, and the healthcare IT students learned about pharmacy workflow as well as communicating with healthcare specialists.","PeriodicalId":404291,"journal":{"name":"Proceedings of the 14th annual ACM SIGITE conference on Information technology education","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123781366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Smarkusky, S. Toman, Peter Sutor, Christopher Hunt
{"title":"Performing robots: innovative interdisciplinary projects","authors":"D. Smarkusky, S. Toman, Peter Sutor, Christopher Hunt","doi":"10.1145/2512276.2512285","DOIUrl":"https://doi.org/10.1145/2512276.2512285","url":null,"abstract":"By challenging and engaging students in interdisciplinary projects, we provide a learning platform to enhance creativity, critical thinking and problem-solving skills, while promoting an innovation-oriented culture in academia. In this paper, we summarize interdisciplinary and undergraduate research projects in music and animation that integrate technologies from both disciplines to create unique and innovative projects. Iterative development coupled with various forms of visual and audio feedback enhanced the student learning experience with positive feedback from students. These efforts have resulted in the awarding of internal grant funding, interest in additional undergraduate research projects, and enhanced awareness of the application of technology to other disciplines.","PeriodicalId":404291,"journal":{"name":"Proceedings of the 14th annual ACM SIGITE conference on Information technology education","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127274294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Paper session H1: pedagogy","authors":"Chi Zhang","doi":"10.1145/3254720","DOIUrl":"https://doi.org/10.1145/3254720","url":null,"abstract":"","PeriodicalId":404291,"journal":{"name":"Proceedings of the 14th annual ACM SIGITE conference on Information technology education","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130016353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identifying information technology graduate-level programs","authors":"B. Lunt, M. Q. Adams","doi":"10.1145/2512276.2512280","DOIUrl":"https://doi.org/10.1145/2512276.2512280","url":null,"abstract":"This paper follows up on a previous paper identifying four-year IT programs in the USA, and identifies graduate-level programs in IT within the four-year IT programs identified. The entrance requirements are also given.","PeriodicalId":404291,"journal":{"name":"Proceedings of the 14th annual ACM SIGITE conference on Information technology education","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126306203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Training cyber-defense and securing information assets using student blue teams","authors":"Scott J. Pack, D. Rowe","doi":"10.1145/2512276.2512290","DOIUrl":"https://doi.org/10.1145/2512276.2512290","url":null,"abstract":"In this paper, we discuss the creation of a student Blue Team to assist campus organizations with security incident response. We also explore approaches for establishing a relationship with university information technology staff, informing blue team members of professional and ethical responsibilities, and aiding system administrators with incident response and system hardening. Finally, we discuss the benefits to students taking part in these activities, as well as their contributions to improving an organizations security posture.","PeriodicalId":404291,"journal":{"name":"Proceedings of the 14th annual ACM SIGITE conference on Information technology education","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115380731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}