{"title":"Session details: Paper session B1: curriculum","authors":"J. Preston","doi":"10.1145/3254712","DOIUrl":"https://doi.org/10.1145/3254712","url":null,"abstract":"","PeriodicalId":404291,"journal":{"name":"Proceedings of the 14th annual ACM SIGITE conference on Information technology education","volume":"9 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123540273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Paper session A1: cyber","authors":"Xinli Wang","doi":"10.1145/3254710","DOIUrl":"https://doi.org/10.1145/3254710","url":null,"abstract":"","PeriodicalId":404291,"journal":{"name":"Proceedings of the 14th annual ACM SIGITE conference on Information technology education","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116911095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing information technology education (ITE) with the use of 3D printer technology","authors":"Robert Lutz","doi":"10.1145/2512276.2512327","DOIUrl":"https://doi.org/10.1145/2512276.2512327","url":null,"abstract":"This workshop provides an introduction to three-dimensional (3D) printing. This tutorial will: cover the general background of 3D printing, summarize popular software tools, describe associated challenges and offer suggestions for application within information technology (IT) coursework. Attendees will get hands-on experience with 3D printing tools and will be able to print a limited number of items during the workshop. The workshop will also describe the author's experience integrating this authentic learning into several IT courses. (Participant Laptop Recommended)","PeriodicalId":404291,"journal":{"name":"Proceedings of the 14th annual ACM SIGITE conference on Information technology education","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127253938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Paper session J1: innovation & VoIP","authors":"Ken A Baker","doi":"10.1145/3254722","DOIUrl":"https://doi.org/10.1145/3254722","url":null,"abstract":"","PeriodicalId":404291,"journal":{"name":"Proceedings of the 14th annual ACM SIGITE conference on Information technology education","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124086737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A preliminary review of undergraduate programming students' perspectives on writing tests, working with others, & using peer testing","authors":"Alessio Gaspar, S. Langevin, N. Boyer, R. Tindell","doi":"10.1145/2512276.2512301","DOIUrl":"https://doi.org/10.1145/2512276.2512301","url":null,"abstract":"Techniques such as Pair Programming, or allowing students to run their programs against a reference test harness, have demonstrated their effectiveness in improving grades or retention rates. This paper proposes to supplement the existing literature by investigating students' perceptions of the benefits of writing tests, working with other students and using Peer Testing. Responses to an online anonymous survey cast new light on the relation between testing and programming and confirm previously postulated limitations of collaborative approaches; i.e. the unbalanced nature of contributions and lack of didactic interactions in student groups. We then examine how Peer Testing is perceived and discuss its relation to both collaboration and test-based pedagogies.","PeriodicalId":404291,"journal":{"name":"Proceedings of the 14th annual ACM SIGITE conference on Information technology education","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130862865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Infusing social science into cybersecurity education","authors":"Mark Stockman","doi":"10.1145/2512276.2512302","DOIUrl":"https://doi.org/10.1145/2512276.2512302","url":null,"abstract":"Cybersecurity, while definitively categorized as a sub-discipline of computing, is widely considered multidisciplinary in nature. This paper documents two attempts to adopt non-computing ideas and approaches in undergraduate cybersecurity courses for information technology majors. Specifically, the author uses the social sciences (criminal justice and political science) to elicit a deeper understanding of cybersecurity problems and to present interdisciplinary methodological approaches to students who, in their careers, will be tasked with defending against cyberthreats.","PeriodicalId":404291,"journal":{"name":"Proceedings of the 14th annual ACM SIGITE conference on Information technology education","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131790465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyber-physical system concepts for IT students","authors":"C. Helps, Scott J. Pack","doi":"10.1145/2512276.2512303","DOIUrl":"https://doi.org/10.1145/2512276.2512303","url":null,"abstract":"Cyber-Physical Systems (CPS), a.k.a. embedded systems, are becoming increasingly important within Information Technology. As the \"Internet of Things\" and ubiquitous mobile devices impact an ever-increasing segment of IT, it becomes imperative for IT students and professionals to appreciate the key concepts of CPS so that they can design IT systems. Special consideration should include aspects of networking, security and HCI within CPS and mixed systems. This report presents an introductory experience, targeted at first-year students in IT, to help them understand the key concepts of CPS that are relevant to IT professionals. The experience is offered within the context of a first-year class where a single lecture and a single short lab experience are assigned to introduce CPS concepts. The lecture and lab are designed to engage the students, help them understand the relevance of this discipline to IT professionals and give to them a taste of designing and working with CPS. The lab and lecture was designed as a combination demonstration and development experience. In the experience, students developed a working system within the one-hour lab available and explored several CPS and related IT concepts. Details of the lab design are presented. Student learning was assessed and learning results and student responses are presented.","PeriodicalId":404291,"journal":{"name":"Proceedings of the 14th annual ACM SIGITE conference on Information technology education","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114596354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Demographics of undergraduate students in game degree programs in the US and UK","authors":"Monica Mcgill, Amber Settle, Adrienne Decker","doi":"10.1145/2512276.2512278","DOIUrl":"https://doi.org/10.1145/2512276.2512278","url":null,"abstract":"Over the last decade, there has been a growth in the video game industry and, at the same time, game degree programs at post-secondary institutions worldwide have grown in quantity and quality. Representation of gender and race in games and in the game industry workforce is an important issue. We explore this topic in our research, providing an overview of the demographics of undergraduate students in game degree programs in the United States and the United Kingdom. We include race, gender, ethnicity, political preferences, sexual orientation and more. Gender results indicate that males make up the significant majority in undergraduate game programs. Women are significantly more likely to think that the gaming industry, programs at the university, and project teams at the university are not as diverse as men think they are. Women are also significantly more likely to report that their programs would benefit from more diversity than men.","PeriodicalId":404291,"journal":{"name":"Proceedings of the 14th annual ACM SIGITE conference on Information technology education","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116255039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Steven Nordstrom, Arisoa S. Randrianasolo, Eddy C. Borera, F. Mhlanga
{"title":"Winds of change: toward systemic improvement of a computer science program","authors":"Steven Nordstrom, Arisoa S. Randrianasolo, Eddy C. Borera, F. Mhlanga","doi":"10.1145/2512276.2512298","DOIUrl":"https://doi.org/10.1145/2512276.2512298","url":null,"abstract":"Computer science programs at small, liberal arts universities often have difficulty with effectively managing change, and attracting and retaining top students and faculty. They also sometimes struggle to provide a relevant and appealing curriculum while maintaining an appropriate level of academic rigor. This paper presents a restructuring of our department and computer science degree program, identifies several key areas of our curriculum which needed attention, outlines our improvement areas, and proposes a self-assessment strategy for gauging the effectiveness of the program changes over time.","PeriodicalId":404291,"journal":{"name":"Proceedings of the 14th annual ACM SIGITE conference on Information technology education","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124034348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Preston, H. Reichgelt, Rebecca H. Rutherfoord, Chi Zhang, Jack G. Zheng
{"title":"New educational learning environments: riding the wave of change instead of having it crash upon us","authors":"J. Preston, H. Reichgelt, Rebecca H. Rutherfoord, Chi Zhang, Jack G. Zheng","doi":"10.1145/2512276.2512307","DOIUrl":"https://doi.org/10.1145/2512276.2512307","url":null,"abstract":"The environment of higher education is changing; we have new challenges and opportunities created by social media, streaming technology, access to learning materials, and pathways of acquiring and assessing knowledge and skills. This panel discusses forces of change and disruption to existing models of higher education and suggests means by which IT departments can leverage these changes. Each panel participant addresses a specific area, including technology-mediated learning, learning management systems, learning object repositories, ensuring quality control and accreditation, and how to successfully administer and manage these suggested changes.","PeriodicalId":404291,"journal":{"name":"Proceedings of the 14th annual ACM SIGITE conference on Information technology education","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126473093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}