首页 > 最新文献

Proceedings of the 21st Annual Conference on Information Technology Education最新文献

英文 中文
Continuous Planning and Forecasting Framework (CPFF) for Agile Project Management: Overcoming the 敏捷项目管理的持续计划和预测框架(CPFF):克服
Pub Date : 2020-10-07 DOI: 10.1145/3368308.3415398
Thomas Dilger, Christian Ploder, W. Haas, Pascal Schöttle, R. Bernsteiner
Despite the many problems the COVID-19 pandemic creates in the economies worldwide, recent research in academia tries to find new ways to support enterprises and companies counteracting the crisis. This study discusses the question of how an agile project budgeting resp. The Continuous Planning and Forecasting Framework (CPFF) for agile project management can be used to support teams working in an "agilefall" (the in-between state of traditional and agile) environment to reach a certain level of certainty under uncertain conditions. This contribution refines the first drafted Continuous Forecasting Framework, presented on the Software Engineering 2020, incorporating feedback from academia and practitioners using agile methods. For readers who have never worked in a real agile environment, it is often difficult to grasp why getting off the strict path following an iterative beyond budgeting approach could increase certainty. Therefore, the authors depict the framework by applying it to specific problems within traditional project boundaries focusing on elements that could help teams overcoming the "agilefall"-budgeting trap.
尽管COVID-19大流行给全球经济带来了许多问题,但学术界最近的研究试图找到支持企业和公司应对危机的新方法。本研究讨论了敏捷项目预算如何体现的问题。用于敏捷项目管理的持续计划和预测框架(CPFF)可用于支持在“敏捷下降”(传统和敏捷之间的状态)环境中工作的团队在不确定条件下达到一定程度的确定性。这一贡献细化了第一份连续预测框架草案,该框架在软件工程2020上提出,结合了来自学术界和使用敏捷方法的实践者的反馈。对于从未在真正的敏捷环境中工作过的读者来说,通常很难理解为什么脱离严格的路径,遵循迭代超越预算的方法可以增加确定性。因此,作者通过将该框架应用于传统项目边界内的特定问题来描述该框架,重点关注可以帮助团队克服“敏捷坠落”预算陷阱的元素。
{"title":"Continuous Planning and Forecasting Framework (CPFF) for Agile Project Management: Overcoming the","authors":"Thomas Dilger, Christian Ploder, W. Haas, Pascal Schöttle, R. Bernsteiner","doi":"10.1145/3368308.3415398","DOIUrl":"https://doi.org/10.1145/3368308.3415398","url":null,"abstract":"Despite the many problems the COVID-19 pandemic creates in the economies worldwide, recent research in academia tries to find new ways to support enterprises and companies counteracting the crisis. This study discusses the question of how an agile project budgeting resp. The Continuous Planning and Forecasting Framework (CPFF) for agile project management can be used to support teams working in an \"agilefall\" (the in-between state of traditional and agile) environment to reach a certain level of certainty under uncertain conditions. This contribution refines the first drafted Continuous Forecasting Framework, presented on the Software Engineering 2020, incorporating feedback from academia and practitioners using agile methods. For readers who have never worked in a real agile environment, it is often difficult to grasp why getting off the strict path following an iterative beyond budgeting approach could increase certainty. Therefore, the authors depict the framework by applying it to specific problems within traditional project boundaries focusing on elements that could help teams overcoming the \"agilefall\"-budgeting trap.","PeriodicalId":374890,"journal":{"name":"Proceedings of the 21st Annual Conference on Information Technology Education","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114068864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Integrated Cybersecurity Plus Robotics Lesson Using NAO 综合网络安全加上机器人课程使用NAO
Pub Date : 2020-10-07 DOI: 10.1145/3368308.3415418
Ankur Chattopadhyay, M. Azhar, Thomas Everson, R. Ruska
This paper describes a novel experimental study that investigates the merits of an integrated cybersecurity plus robotics lesson plan, using the NAO humanoid robot, when it comes to introducing cybersecurity and robotics together to college and pre-college learners. We first present our unique cybersecurity plus robotics lesson, which is based upon a nifty experiential-learning model that combines basic cybersecurity concepts with educational robotics (ER) in the form of a hands-on experiment with NAO. Our lesson plan includes a demonstration of a successful hack into NAO's video stream, followed by covert capturing of its live camera feed. We then discuss results from two separate experimental case studies, the first one being a conventional approach of introducing cybersecurity concepts via a traditional lesson plan, which involves no robot. The second study involves our non-traditional technique of introducing cybersecurity plus robotics using NAO. We present the student survey data collected from these two studies and discuss their respective outcomes. We also analyze the pre and post student survey-based assessment data from these studies for showing preliminary evidence of the effectiveness and potential of our approach. Existing literature indicates that there is limited work on investigating the efficacy of learning cybersecurity plus ER using an interactive, humanoid robot, like NAO. Our work is an attempt to address this research gap in the literature. We intend to prepare the grounds for further research within this emerging topic of integrated cybersecurity and robotics education, so that students can gain from a positive and engaging experiential-learning experience.
本文描述了一项新的实验研究,该研究调查了使用NAO人形机器人的综合网络安全和机器人课程计划的优点,当涉及到将网络安全和机器人技术一起介绍给大学和大学预科学习者时。我们首先介绍了我们独特的网络安全加上机器人课程,这是基于一个漂亮的体验式学习模型,将基本的网络安全概念与教育机器人(ER)结合在一起,以NAO的实践实验的形式。我们的课程计划包括演示如何成功入侵NAO的视频流,然后秘密捕获其实时摄像机馈电。然后,我们讨论了两个独立的实验案例研究的结果,第一个是通过传统的课程计划引入网络安全概念的传统方法,其中不涉及机器人。第二项研究涉及我们使用NAO引入网络安全和机器人的非传统技术。我们提出了从这两项研究中收集的学生调查数据,并讨论了各自的结果。我们还分析了这些研究的前后基于学生调查的评估数据,以显示我们方法的有效性和潜力的初步证据。现有文献表明,使用交互式人形机器人(如NAO)来研究学习网络安全与ER的有效性的工作有限。我们的工作是试图解决这一研究缺口的文献。我们打算为这个新兴的综合网络安全和机器人教育主题的进一步研究奠定基础,这样学生就可以从一个积极的、引人入胜的体验式学习中获益。
{"title":"Integrated Cybersecurity Plus Robotics Lesson Using NAO","authors":"Ankur Chattopadhyay, M. Azhar, Thomas Everson, R. Ruska","doi":"10.1145/3368308.3415418","DOIUrl":"https://doi.org/10.1145/3368308.3415418","url":null,"abstract":"This paper describes a novel experimental study that investigates the merits of an integrated cybersecurity plus robotics lesson plan, using the NAO humanoid robot, when it comes to introducing cybersecurity and robotics together to college and pre-college learners. We first present our unique cybersecurity plus robotics lesson, which is based upon a nifty experiential-learning model that combines basic cybersecurity concepts with educational robotics (ER) in the form of a hands-on experiment with NAO. Our lesson plan includes a demonstration of a successful hack into NAO's video stream, followed by covert capturing of its live camera feed. We then discuss results from two separate experimental case studies, the first one being a conventional approach of introducing cybersecurity concepts via a traditional lesson plan, which involves no robot. The second study involves our non-traditional technique of introducing cybersecurity plus robotics using NAO. We present the student survey data collected from these two studies and discuss their respective outcomes. We also analyze the pre and post student survey-based assessment data from these studies for showing preliminary evidence of the effectiveness and potential of our approach. Existing literature indicates that there is limited work on investigating the efficacy of learning cybersecurity plus ER using an interactive, humanoid robot, like NAO. Our work is an attempt to address this research gap in the literature. We intend to prepare the grounds for further research within this emerging topic of integrated cybersecurity and robotics education, so that students can gain from a positive and engaging experiential-learning experience.","PeriodicalId":374890,"journal":{"name":"Proceedings of the 21st Annual Conference on Information Technology Education","volume":"213 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134125278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-based Learning Credential Revision and Revocation Method 基于区块链的学习证书修改和撤销方法
Pub Date : 2020-10-07 DOI: 10.1145/3368308.3415456
Aye Mi San, N. Chotikakamthorn, C. Sathitwiriyawong
Many blockchain-based learning credential systems have been proposed to reduce fraud and improve verification efficiency. In addition to a method for issuing and verifying credentials, a solution is needed to support the revision and revocation of an issued credential record. For the case of learning credentials, depending on how a revocation policy affects credential use that occurred before the revocation date, an additional mechanism may be needed for credential revision. Current digital learning credential methods offer only a revocation mechanism. So they do not fully meet such unique requirement in the education context. In this paper, a blockchain-based method for learning credential revision and revocation is proposed. It makes use of the revision and revocation addresses assigned to each batch of issuing credentials. To revise (revoke) one or more credentials, the proposed method stores the revision (revocation) list as a message in the OP_RETURN field of the revision (revocation) transaction, with the revision (revocation) address as one of its outputs. The concept of a local credential id has been introduced to allow a revision (revocation) list to be efficiently stored on a blockchain system. It is based entirely on a blockchain system and does not require any centralized authority. It is also applicable to most blockchain systems. A comparative study of the proposed method against existing credential revocation methods is also provided.
已经提出了许多基于区块链的学习证书系统,以减少欺诈并提高验证效率。除了用于颁发和验证凭证的方法之外,还需要一个解决方案来支持已颁发的凭证记录的修订和撤销。对于学习凭证的情况,根据吊销策略如何影响在吊销日期之前发生的凭证使用,可能需要额外的机制来进行凭证修订。目前的数字学习证书方法只提供一个撤销机制。因此,他们并没有完全满足这种教育背景下的独特要求。本文提出了一种基于区块链的学习证书修改和撤销的方法。它利用分配给每批颁发凭证的修订和撤销地址。为了修改(撤销)一个或多个凭证,建议的方法将修改(撤销)列表作为消息存储在修改(撤销)事务的OP_RETURN字段中,并将修改(撤销)地址作为其输出之一。引入了本地凭证id的概念,以便将修订(撤销)列表有效地存储在区块链系统中。它完全基于区块链系统,不需要任何集中的权力。它也适用于大多数区块链系统。并将该方法与现有的证书撤销方法进行了比较研究。
{"title":"Blockchain-based Learning Credential Revision and Revocation Method","authors":"Aye Mi San, N. Chotikakamthorn, C. Sathitwiriyawong","doi":"10.1145/3368308.3415456","DOIUrl":"https://doi.org/10.1145/3368308.3415456","url":null,"abstract":"Many blockchain-based learning credential systems have been proposed to reduce fraud and improve verification efficiency. In addition to a method for issuing and verifying credentials, a solution is needed to support the revision and revocation of an issued credential record. For the case of learning credentials, depending on how a revocation policy affects credential use that occurred before the revocation date, an additional mechanism may be needed for credential revision. Current digital learning credential methods offer only a revocation mechanism. So they do not fully meet such unique requirement in the education context. In this paper, a blockchain-based method for learning credential revision and revocation is proposed. It makes use of the revision and revocation addresses assigned to each batch of issuing credentials. To revise (revoke) one or more credentials, the proposed method stores the revision (revocation) list as a message in the OP_RETURN field of the revision (revocation) transaction, with the revision (revocation) address as one of its outputs. The concept of a local credential id has been introduced to allow a revision (revocation) list to be efficiently stored on a blockchain system. It is based entirely on a blockchain system and does not require any centralized authority. It is also applicable to most blockchain systems. A comparative study of the proposed method against existing credential revocation methods is also provided.","PeriodicalId":374890,"journal":{"name":"Proceedings of the 21st Annual Conference on Information Technology Education","volume":"289 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116593977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Benefits and Pitfalls of Jupyter Notebooks in the Classroom 课堂上使用Jupyter笔记本的好处和缺陷
Pub Date : 2020-10-07 DOI: 10.1145/3368308.3415397
Jeremiah W. Johnson
Jupyter notebooks are widely used in industry and in academic research, but have only begun to make inroads into the classroom. The design of the Jupyter notebook is in many ways well suited for teaching subjects in information technology and computer science, but it is a tool that departs significantly from a standard text editor or integrated development environment, and thus carries with it several unique advantages as well as several surprising potential pitfalls. As use of Jupyter notebooks has grown, so has criticism of the notebook, for varied reasons: notebooks can behave in unexpected ways, they can be difficult to reproduce, they open up potential security issues, and they may encourage poor coding practices. A set of best practices to guide instructors and help addressing these concerns when using Jupyter notebooks in the classroom is currently lacking. This paper addresses the strengths and weaknesses of the Jupyter notebook for education, drawing on existing literature as well as the author's experience teaching a range of courses with Jupyter notebooks for over five years, and recommends a set of best practices for teaching with the Jupyter notebook.
Jupyter笔记本广泛应用于工业和学术研究,但才刚刚开始进入课堂。Jupyter笔记本的设计在很多方面都非常适合于信息技术和计算机科学的教学,但是它是一个与标准文本编辑器或集成开发环境有很大区别的工具,因此它具有一些独特的优点,也有一些令人惊讶的潜在缺陷。随着Jupyter笔记本的使用越来越多,对笔记本的批评也越来越多,原因多种多样:笔记本可能以意想不到的方式运行,它们可能难以复制,它们可能引发潜在的安全问题,并且它们可能鼓励糟糕的编码实践。在课堂上使用Jupyter笔记本时,指导教师并帮助解决这些问题的一组最佳实践目前还缺乏。本文阐述了Jupyter笔记本用于教育的优势和劣势,借鉴了现有文献以及作者使用Jupyter笔记本教授一系列课程超过五年的经验,并推荐了一套使用Jupyter笔记本进行教学的最佳实践。
{"title":"Benefits and Pitfalls of Jupyter Notebooks in the Classroom","authors":"Jeremiah W. Johnson","doi":"10.1145/3368308.3415397","DOIUrl":"https://doi.org/10.1145/3368308.3415397","url":null,"abstract":"Jupyter notebooks are widely used in industry and in academic research, but have only begun to make inroads into the classroom. The design of the Jupyter notebook is in many ways well suited for teaching subjects in information technology and computer science, but it is a tool that departs significantly from a standard text editor or integrated development environment, and thus carries with it several unique advantages as well as several surprising potential pitfalls. As use of Jupyter notebooks has grown, so has criticism of the notebook, for varied reasons: notebooks can behave in unexpected ways, they can be difficult to reproduce, they open up potential security issues, and they may encourage poor coding practices. A set of best practices to guide instructors and help addressing these concerns when using Jupyter notebooks in the classroom is currently lacking. This paper addresses the strengths and weaknesses of the Jupyter notebook for education, drawing on existing literature as well as the author's experience teaching a range of courses with Jupyter notebooks for over five years, and recommends a set of best practices for teaching with the Jupyter notebook.","PeriodicalId":374890,"journal":{"name":"Proceedings of the 21st Annual Conference on Information Technology Education","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129942502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
An Examination of Regional Tech Meetups Found on Meetup.com 在Meetup.com上发现的区域技术聚会的检查
Pub Date : 2020-10-07 DOI: 10.1145/3368308.3415434
Russell E. McMahon
This study grew out of the Amazon announcement in 2017 that it would create a second headquarters with most of the competing cities being in the East-Midwest section of the United States. The city of Cincinnati threw in its hat as did another 237 cities. Cincinnati was eventually eliminated in part because 'it was not technical' enough according to Amazon. Amazon narrowed down the 238 'contestants' to 20. Part of the author's research has been on the technical community within the Cincinnati area and the Amazon new headquarters search got one wondering 'just how does Cincinnati compare to other cities'? This study looks at cities within 1000km radius of Cincinnati plus the other US members of the Amazon20. This report looks at only those IT organizations that were found on Meetup.com and covered a total of 68 cities mostly in the Midwest and Eastern US.
这项研究源于亚马逊在2017年宣布将建立第二个总部,大多数竞争城市都在美国的东中西部地区。辛辛那提市和其他237个城市都榜上有名。根据亚马逊的说法,辛辛那提最终被淘汰的部分原因是“技术不够”。亚马逊将238个“竞争者”缩小到20个。作者的部分研究是关于辛辛那提地区的技术社区,而亚马逊新总部的搜索让人想知道“辛辛那提与其他城市相比如何”?这项研究考察了辛辛那提方圆1000公里以内的城市以及美国亚马逊河流域的其他成员。这份报告只关注那些在Meetup.com上发现的IT组织,覆盖了美国中西部和东部的68个城市。
{"title":"An Examination of Regional Tech Meetups Found on Meetup.com","authors":"Russell E. McMahon","doi":"10.1145/3368308.3415434","DOIUrl":"https://doi.org/10.1145/3368308.3415434","url":null,"abstract":"This study grew out of the Amazon announcement in 2017 that it would create a second headquarters with most of the competing cities being in the East-Midwest section of the United States. The city of Cincinnati threw in its hat as did another 237 cities. Cincinnati was eventually eliminated in part because 'it was not technical' enough according to Amazon. Amazon narrowed down the 238 'contestants' to 20. Part of the author's research has been on the technical community within the Cincinnati area and the Amazon new headquarters search got one wondering 'just how does Cincinnati compare to other cities'? This study looks at cities within 1000km radius of Cincinnati plus the other US members of the Amazon20. This report looks at only those IT organizations that were found on Meetup.com and covered a total of 68 cities mostly in the Midwest and Eastern US.","PeriodicalId":374890,"journal":{"name":"Proceedings of the 21st Annual Conference on Information Technology Education","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121437402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mango Quality Grading using Deep Learning Technique: Perspectives from Agriculture and Food Industry 使用深度学习技术的芒果质量分级:来自农业和食品工业的观点
Pub Date : 2020-10-07 DOI: 10.1145/3368308.3415370
Varsha Bhole, Arun Kumar
India is an agrarian country; agriculture business is major source of income. India holds the first rank in mango (Mangifera Indica Linn) production worldwide. The precise grading of the fruit acts extensively in agricultural sector for the commercial development of India. Prior to bring the agricultural products to the market, it is essential to classify and grade them automatically without manual intervention. In this research study, we have designed and implemented deep learning-centered non-destructive mango sorting and grading system. The designed quality assessment scheme comprises of two phases: developing hardware and software. The hardware is built to photograph the RGB and thermal images of mango fruits from all the directions (360°) automatically. From these images, designed software classifies mangoes into three grades according to quality viz. Extra class, Class-I, and Class-II. Mango grading has been done by using parameters such as defects, shape, size, and maturity. In the present work, transfer learning based pre-trained SqueezeNet model has been employed to assess grading of mangoes. The test result reveals that classification accuracy of proposed system is 93.33% and 92.27% with the training time of 30.03 and 7.38 minutes for RGB and thermal images respectively and shows four times speed up through thermal imaging.
印度是一个农业国家;农业经营是主要的收入来源。印度是世界上芒果产量第一的国家。水果的精确分级在印度农业部门的商业发展中起着广泛的作用。在将农产品推向市场之前,必须在没有人工干预的情况下对农产品进行自动分类和分级。在本研究中,我们设计并实现了以深度学习为中心的芒果无损分类分级系统。所设计的质量评估方案包括硬件开发和软件开发两个阶段。该硬件可以自动从各个方向(360°)拍摄芒果果实的RGB和热图像。根据这些图片,设计的软件将芒果按照质量分为特级、一级和二级三个等级。芒果分级是通过使用缺陷、形状、大小和成熟度等参数来完成的。在本研究中,采用迁移学习为基础的预训练SqueezeNet模型来评估芒果的分级。测试结果表明,该系统对RGB图像和热图像的分类准确率分别为93.33%和92.27%,训练时间分别为30.03分钟和7.38分钟,热成像速度提高了4倍。
{"title":"Mango Quality Grading using Deep Learning Technique: Perspectives from Agriculture and Food Industry","authors":"Varsha Bhole, Arun Kumar","doi":"10.1145/3368308.3415370","DOIUrl":"https://doi.org/10.1145/3368308.3415370","url":null,"abstract":"India is an agrarian country; agriculture business is major source of income. India holds the first rank in mango (Mangifera Indica Linn) production worldwide. The precise grading of the fruit acts extensively in agricultural sector for the commercial development of India. Prior to bring the agricultural products to the market, it is essential to classify and grade them automatically without manual intervention. In this research study, we have designed and implemented deep learning-centered non-destructive mango sorting and grading system. The designed quality assessment scheme comprises of two phases: developing hardware and software. The hardware is built to photograph the RGB and thermal images of mango fruits from all the directions (360°) automatically. From these images, designed software classifies mangoes into three grades according to quality viz. Extra class, Class-I, and Class-II. Mango grading has been done by using parameters such as defects, shape, size, and maturity. In the present work, transfer learning based pre-trained SqueezeNet model has been employed to assess grading of mangoes. The test result reveals that classification accuracy of proposed system is 93.33% and 92.27% with the training time of 30.03 and 7.38 minutes for RGB and thermal images respectively and shows four times speed up through thermal imaging.","PeriodicalId":374890,"journal":{"name":"Proceedings of the 21st Annual Conference on Information Technology Education","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130948507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Early Information Technology Program High School Teachers' Training and Continual Professional Development 早期信息技术计划高中教师培训和持续专业发展
Pub Date : 2020-10-07 DOI: 10.1145/3368308.3415449
J. Fritz, Selena Ramanayake, Tracy Collins
The School of Information Technology (SoIT) established an Early IT program where the six, first-year IT courses of the Bachelor of Science in Information Technology (BSIT) degree are taught in the local schools by certified high school teachers. These courses (e.g., fundamentals of IT, networking, programming, database, web development, system administration) are dual credit and allow high school students to graduate from high school with the first year of the SoIT BSIT degree complete. A competency-based educational graduate certificate was developed to train and certify high school teachers to teach these college classes at their local schools.
信息技术学院(SoIT)建立了一个早期信息技术项目,在当地学校由有资格的高中教师教授信息技术学士学位(BSIT)第一年的6门信息技术课程。这些课程(如IT基础、网络、编程、数据库、web开发、系统管理)是双学分的,允许高中学生在完成SoIT BSIT学位的第一年就从高中毕业。制定了以能力为基础的教育研究生证书,以培训和认证高中教师在当地学校教授这些大学课程。
{"title":"Early Information Technology Program High School Teachers' Training and Continual Professional Development","authors":"J. Fritz, Selena Ramanayake, Tracy Collins","doi":"10.1145/3368308.3415449","DOIUrl":"https://doi.org/10.1145/3368308.3415449","url":null,"abstract":"The School of Information Technology (SoIT) established an Early IT program where the six, first-year IT courses of the Bachelor of Science in Information Technology (BSIT) degree are taught in the local schools by certified high school teachers. These courses (e.g., fundamentals of IT, networking, programming, database, web development, system administration) are dual credit and allow high school students to graduate from high school with the first year of the SoIT BSIT degree complete. A competency-based educational graduate certificate was developed to train and certify high school teachers to teach these college classes at their local schools.","PeriodicalId":374890,"journal":{"name":"Proceedings of the 21st Annual Conference on Information Technology Education","volume":"11 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114120682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New ABET Information Technology Program Criteria: The 5 W's Questions ABET信息技术课程新标准:5个W的问题
Pub Date : 2020-10-07 DOI: 10.1145/3368308.3415424
Jim Leone, Sandra Gorka, Scott Murray, Mihaela Sabin
The release of the ACM/IEEE-Computer Society curriculum guidelines for undergraduate Information Technology (IT) programs in December 2017 has initiated a concerted effort led by ABET to revise the IT program accreditation criteria. Representing SIGITE and with participation from academia and industry, the IT Criteria Subcommittee of the ABET CSAB/CAC Joint Criteria Committee has embarked on a multi-year process of drafting, revising, and seeking feedback on updates to the IT program criteria. This panel will present the new IT program accreditation criteria and engage the audience in a productive conversation guided by five "W" questions: (1) Who made the changes and who's impacted by those changes, (2) Why the changes were made, (3) What changed and what did not, (4) Where changes were made, and (5) When the changes will take effect. The panel's presentations and audience participation will also generate helpful suggestions on implementing the accreditation process that takes into account the new IT program criteria.
2017年12月发布的ACM/ ieee -计算机学会本科信息技术(IT)课程指南启动了由ABET领导的共同努力,以修订IT课程认证标准。ABET CSAB/CAC联合标准委员会的IT标准小组委员会代表SIGITE,在学术界和工业界的参与下,已经开始了多年的起草、修订和寻求对IT计划标准更新的反馈的过程。该小组将介绍新的IT项目认证标准,并通过五个“W”问题引导观众进行富有成效的对话:(1)谁进行了更改,谁受到这些更改的影响,(2)为什么进行更改,(3)哪些更改了,哪些没有更改,(4)在哪里进行了更改,以及(5)更改何时生效。专家小组的演讲和听众的参与也将为实施考虑到新的IT项目标准的认证过程提供有益的建议。
{"title":"New ABET Information Technology Program Criteria: The 5 W's Questions","authors":"Jim Leone, Sandra Gorka, Scott Murray, Mihaela Sabin","doi":"10.1145/3368308.3415424","DOIUrl":"https://doi.org/10.1145/3368308.3415424","url":null,"abstract":"The release of the ACM/IEEE-Computer Society curriculum guidelines for undergraduate Information Technology (IT) programs in December 2017 has initiated a concerted effort led by ABET to revise the IT program accreditation criteria. Representing SIGITE and with participation from academia and industry, the IT Criteria Subcommittee of the ABET CSAB/CAC Joint Criteria Committee has embarked on a multi-year process of drafting, revising, and seeking feedback on updates to the IT program criteria. This panel will present the new IT program accreditation criteria and engage the audience in a productive conversation guided by five \"W\" questions: (1) Who made the changes and who's impacted by those changes, (2) Why the changes were made, (3) What changed and what did not, (4) Where changes were made, and (5) When the changes will take effect. The panel's presentations and audience participation will also generate helpful suggestions on implementing the accreditation process that takes into account the new IT program criteria.","PeriodicalId":374890,"journal":{"name":"Proceedings of the 21st Annual Conference on Information Technology Education","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124085875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Challenges and Strategies for Online Teaching in Information Technology and Other Computing Programs 信息技术与其他计算机课程在线教学的挑战与策略
Pub Date : 2020-10-07 DOI: 10.1145/3368308.3415369
Nick Rahimi, Nancy L. Martin
The coronavirus pandemic significantly disrupted the educational landscape nationwide by forcing the widespread closure of institutions from elementary to tertiary levels. With the closure of institutions, programs which typically relied on face-to-face interactions to deliver content were abruptly demanded to switch to online-based education. This upheaval has spawned unique challenges in delivering content for various subjects and disciplines. Particularly in the delivery of technical programs such as information technology and other computing disciplines, the unexpected shift to online classes introduced significant challenges. The inability to interact directly with instructors and peers endangers students? ability to master much of the intricate and abstract concepts in computing courses. Further, students and faculty find themselves socially isolated and neither may be properly prepared for online teaching and learning. Strategies incorporating the use of learning management systems, web conferencing software, and open-source software can, nonetheless, be adopted to mitigate the challenges in the teaching and learning of information technology and other computing courses. This paper discusses some of the challenges that have arisen in the online teaching and learning of these courses. It also details some strategies that will possibly contribute to mitigating these challenges.
冠状病毒大流行严重扰乱了全国的教育格局,迫使小学到高等教育机构普遍关闭。随着机构的关闭,通常依赖于面对面交流来提供内容的课程突然被要求转向基于网络的教育。这种剧变在为不同科目和学科提供内容方面产生了独特的挑战。特别是在诸如信息技术和其他计算学科的技术课程的传授中,意想不到的在线课程的转变带来了巨大的挑战。无法与老师和同学直接互动会危及学生?能够掌握计算机课程中许多复杂和抽象的概念。此外,学生和教师发现自己在社会上是孤立的,他们都没有为在线教学做好准备。然而,可以采用结合使用学习管理系统、网络会议软件和开源软件的策略来减轻信息技术和其他计算机课程教学中的挑战。本文讨论了这些课程在线教学中出现的一些挑战。它还详细介绍了一些可能有助于减轻这些挑战的战略。
{"title":"Challenges and Strategies for Online Teaching in Information Technology and Other Computing Programs","authors":"Nick Rahimi, Nancy L. Martin","doi":"10.1145/3368308.3415369","DOIUrl":"https://doi.org/10.1145/3368308.3415369","url":null,"abstract":"The coronavirus pandemic significantly disrupted the educational landscape nationwide by forcing the widespread closure of institutions from elementary to tertiary levels. With the closure of institutions, programs which typically relied on face-to-face interactions to deliver content were abruptly demanded to switch to online-based education. This upheaval has spawned unique challenges in delivering content for various subjects and disciplines. Particularly in the delivery of technical programs such as information technology and other computing disciplines, the unexpected shift to online classes introduced significant challenges. The inability to interact directly with instructors and peers endangers students? ability to master much of the intricate and abstract concepts in computing courses. Further, students and faculty find themselves socially isolated and neither may be properly prepared for online teaching and learning. Strategies incorporating the use of learning management systems, web conferencing software, and open-source software can, nonetheless, be adopted to mitigate the challenges in the teaching and learning of information technology and other computing courses. This paper discusses some of the challenges that have arisen in the online teaching and learning of these courses. It also details some strategies that will possibly contribute to mitigating these challenges.","PeriodicalId":374890,"journal":{"name":"Proceedings of the 21st Annual Conference on Information Technology Education","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124187985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Novel Approach for Embedding and Traversing Problems in Serious Games 严肃游戏中嵌入和遍历问题的新方法
Pub Date : 2020-10-07 DOI: 10.1145/3368308.3415417
Abhishek Parakh, M. Subramaniam, P. Chundi, E. Ostler
This paper presents a novel approach for embedding and traversing problems in serious games. Given a set of concepts, problems built upon these concepts, and the complexities of the concepts, we propose an automatic mechanism that aids the game developers on which problems can be put on the same level and which problems must only be reachable when certain dependencies are met. The proposed network traversal algorithm allows the player/student to efficiently complete all the problems with increasing complexity at each step. The proposed approach is general purpose and has has been implemented in our quantum cryptography game, QuaSim.
本文提出了一种求解严肃博弈中嵌入和遍历问题的新方法。给定一组概念、基于这些概念的问题以及概念的复杂性,我们提出一种自动机制,帮助游戏开发者确定哪些问题可以放在同一级别,哪些问题必须在满足某些依赖关系时才能解决。所提出的网络遍历算法允许玩家/学生有效地完成每一步复杂性增加的所有问题。所提出的方法是通用的,并且已经在我们的量子加密游戏QuaSim中实现。
{"title":"A Novel Approach for Embedding and Traversing Problems in Serious Games","authors":"Abhishek Parakh, M. Subramaniam, P. Chundi, E. Ostler","doi":"10.1145/3368308.3415417","DOIUrl":"https://doi.org/10.1145/3368308.3415417","url":null,"abstract":"This paper presents a novel approach for embedding and traversing problems in serious games. Given a set of concepts, problems built upon these concepts, and the complexities of the concepts, we propose an automatic mechanism that aids the game developers on which problems can be put on the same level and which problems must only be reachable when certain dependencies are met. The proposed network traversal algorithm allows the player/student to efficiently complete all the problems with increasing complexity at each step. The proposed approach is general purpose and has has been implemented in our quantum cryptography game, QuaSim.","PeriodicalId":374890,"journal":{"name":"Proceedings of the 21st Annual Conference on Information Technology Education","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129424707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
Proceedings of the 21st Annual Conference on Information Technology Education
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1