首页 > 最新文献

Proceedings of the 21st Annual Conference on Information Technology Education最新文献

英文 中文
Clickthrough Testing for Real-World Phishing Simulations 点击通过测试真实世界的网络钓鱼模拟
Pub Date : 2020-10-07 DOI: 10.1145/3368308.3415443
M. Dupuis, Samantha Smith
In this paper, we begin by discussing the challenges associated with phishing email simulations. In part, we note how challenging it is to achieve realism in such a simulation and what this may mean for the results obtained. Next, we detail a real-world phishing simulation that targeted participants involved in an unrelated research project.
在本文中,我们首先讨论与网络钓鱼电子邮件模拟相关的挑战。在某种程度上,我们注意到在这样的模拟中实现真实感是多么具有挑战性,以及这对获得的结果可能意味着什么。接下来,我们详细介绍了一个真实世界的网络钓鱼模拟,目标是参与一个不相关的研究项目的参与者。
{"title":"Clickthrough Testing for Real-World Phishing Simulations","authors":"M. Dupuis, Samantha Smith","doi":"10.1145/3368308.3415443","DOIUrl":"https://doi.org/10.1145/3368308.3415443","url":null,"abstract":"In this paper, we begin by discussing the challenges associated with phishing email simulations. In part, we note how challenging it is to achieve realism in such a simulation and what this may mean for the results obtained. Next, we detail a real-world phishing simulation that targeted participants involved in an unrelated research project.","PeriodicalId":374890,"journal":{"name":"Proceedings of the 21st Annual Conference on Information Technology Education","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115288473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Improving Student Success through an Articulation Program in Software Engineering 通过软件工程的发音程序提高学生的成功
Pub Date : 2020-10-07 DOI: 10.1145/3368308.3415358
James Philips, Nathanael Fenwick, Storm Davis, Nasseh Tabrizi
The swift advancement of computerization has resulted in an increased need for individuals skilled in a variety of highly technical fields. This demand is currently inadequately met by the United States? domestic workforce and rural areas are underserved by technological resources and opportunities. Due to political and legislative volatility, fixing this workforce shortage is not feasible. Instead, the long-term solution is the cultivation of domestic workforce with high technical expertise. Therefore, we propose a software engineering curriculum that follows the 2 + 2 educational model to meet the needs of community college students in North Carolina as a model for similar initiatives on a regional and national scale. In this paper, we discuss the current status of computer science and software engineering education in North Carolina community colleges, including the current degree programs and relevant curriculum content. Finally, we discuss our proposed curriculum for a 2 + 2 articulation program in software engineering.
计算机化的迅速发展导致对各种高技术领域的熟练人才的需求增加。这一要求目前没有得到美国的充分满足。国内劳动力和农村地区缺乏技术资源和机会。由于政治和立法的不稳定,解决劳动力短缺问题是不可行的。相反,长期的解决办法是培养具有高技术专长的国内劳动力。因此,我们提出了一个遵循2 + 2教育模式的软件工程课程,以满足北卡罗莱纳州社区大学学生的需求,并将其作为区域和全国范围内类似举措的模型。本文讨论了北卡罗来纳州社区学院计算机科学与软件工程教育的现状,包括目前的学位课程和相关课程内容。最后,我们讨论了我们建议的软件工程2 + 2衔接课程。
{"title":"Improving Student Success through an Articulation Program in Software Engineering","authors":"James Philips, Nathanael Fenwick, Storm Davis, Nasseh Tabrizi","doi":"10.1145/3368308.3415358","DOIUrl":"https://doi.org/10.1145/3368308.3415358","url":null,"abstract":"The swift advancement of computerization has resulted in an increased need for individuals skilled in a variety of highly technical fields. This demand is currently inadequately met by the United States? domestic workforce and rural areas are underserved by technological resources and opportunities. Due to political and legislative volatility, fixing this workforce shortage is not feasible. Instead, the long-term solution is the cultivation of domestic workforce with high technical expertise. Therefore, we propose a software engineering curriculum that follows the 2 + 2 educational model to meet the needs of community college students in North Carolina as a model for similar initiatives on a regional and national scale. In this paper, we discuss the current status of computer science and software engineering education in North Carolina community colleges, including the current degree programs and relevant curriculum content. Finally, we discuss our proposed curriculum for a 2 + 2 articulation program in software engineering.","PeriodicalId":374890,"journal":{"name":"Proceedings of the 21st Annual Conference on Information Technology Education","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126604309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluating Student Participation in Undergraduate Information Technology Programs in the U.S. 评估学生在美国本科信息技术课程的参与
Pub Date : 2020-10-07 DOI: 10.1145/3368308.3415396
Mihaela Sabin, S. Zweben, B. Lunt, R. Raj
Enrollment, retention, and graduation rates of undergraduate students in Information Technology (IT) programs are useful measures of institutional performance. Disaggregated by demographics characteristics, such as gender, race, and ethnicity, analysis of student data across IT programs in the U.S. supports the exploration of the breadth and diversity of student participation in IT. Evaluating undergraduate IT programs is particularly challenging for multiple factors, including: IT programs are not always titled "Information Technology"; IT programs are not always ABET-accredited; and IT programs may be housed in various academic units, such as business, computing, engineering, technology, or information sciences. This paper builds on prior work used to identify IT programs in the U.S., including the National Center for Education Statistics' Classification of Instructional Programs (CIP) codes, specifically CIP code 11 that designates IT and other computing programs. It also refines CIP code-based program identification and then analyzes 2017-2018 student data from the National Student Clearinghouse Research Center to evaluate IT programs through a student participation lens. The in-depth analysis of student enrollment, retention, and graduation is intended to support IT programs with designing more inclusive learning environments that increase participation of all students, in particular women and racial and ethnic minority students. This paper finally signals the importance of CIP codes that designate IT programs and focuses attention to the role that faculty, IT programs, and SIGITE community at large need to have in CIP code selection to further advance research in IT education.
信息技术(IT)专业本科生的入学、留校和毕业率是衡量机构绩效的有用指标。根据人口统计特征,如性别、种族和民族,对美国IT项目的学生数据进行分析,有助于探索学生参与IT的广度和多样性。由于多种因素,评估本科IT专业尤其具有挑战性,包括:IT专业并不总是被称为“信息技术”;IT课程并不总是通过abet认证;和IT程序可以安置在不同的学术单位,如商业,计算机,工程,技术,或信息科学。本文建立在先前用于识别美国IT项目的工作的基础上,包括国家教育统计中心的教学项目分类(CIP)代码,特别是指定IT和其他计算项目的CIP代码11。它还改进了基于CIP代码的项目识别,然后分析了来自国家学生信息中心研究中心的2017-2018年学生数据,通过学生参与的角度来评估It项目。对学生入学、留校和毕业情况的深入分析旨在为IT项目提供支持,设计更具包容性的学习环境,提高所有学生的参与度,尤其是女性和少数族裔学生。本文最后指出了指定IT项目的CIP代码的重要性,并将注意力集中在教师、IT项目和SIGITE社区在CIP代码选择中需要发挥的作用,以进一步推进IT教育的研究。
{"title":"Evaluating Student Participation in Undergraduate Information Technology Programs in the U.S.","authors":"Mihaela Sabin, S. Zweben, B. Lunt, R. Raj","doi":"10.1145/3368308.3415396","DOIUrl":"https://doi.org/10.1145/3368308.3415396","url":null,"abstract":"Enrollment, retention, and graduation rates of undergraduate students in Information Technology (IT) programs are useful measures of institutional performance. Disaggregated by demographics characteristics, such as gender, race, and ethnicity, analysis of student data across IT programs in the U.S. supports the exploration of the breadth and diversity of student participation in IT. Evaluating undergraduate IT programs is particularly challenging for multiple factors, including: IT programs are not always titled \"Information Technology\"; IT programs are not always ABET-accredited; and IT programs may be housed in various academic units, such as business, computing, engineering, technology, or information sciences. This paper builds on prior work used to identify IT programs in the U.S., including the National Center for Education Statistics' Classification of Instructional Programs (CIP) codes, specifically CIP code 11 that designates IT and other computing programs. It also refines CIP code-based program identification and then analyzes 2017-2018 student data from the National Student Clearinghouse Research Center to evaluate IT programs through a student participation lens. The in-depth analysis of student enrollment, retention, and graduation is intended to support IT programs with designing more inclusive learning environments that increase participation of all students, in particular women and racial and ethnic minority students. This paper finally signals the importance of CIP codes that designate IT programs and focuses attention to the role that faculty, IT programs, and SIGITE community at large need to have in CIP code selection to further advance research in IT education.","PeriodicalId":374890,"journal":{"name":"Proceedings of the 21st Annual Conference on Information Technology Education","volume":"308 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116619589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
"I Lost Track of Things": Student Experiences of Remote Learning in the Covid-19 Pandemic “我迷失了方向”:新冠肺炎疫情下的学生远程学习体验
Pub Date : 2020-10-07 DOI: 10.1145/3368308.3415413
Chola Chhetri
The world was hit by the Covid-19 pandemic in the beginning of 2020, which forced many educational institutions to shift their classroom-based or face-to-face courses to remote or online mode. Students, instructors and institutions had little time to prepare for this sudden, unanticipated shift. Students who prefer learning face-to-face with instructor in a classroom are more likely to face challenges in learning remotely. To understand the experiences of such students, the author conducted a pilot survey of students whose face-to-face courses were moved to remote learning. This paper reports on the results of the analysis of participant responses. Participants experienced a mix of benefits and challenges due to the unanticipated move to remote learning. Based on the findings, this paper makes some suggestions on the design of remote learning.
2020年初,全球遭受新冠肺炎大流行的打击,许多教育机构被迫将课堂教学或面对面教学转变为远程或在线教学模式。学生、教师和机构几乎没有时间为这种突如其来的、意想不到的转变做好准备。喜欢在课堂上与老师面对面学习的学生更有可能在远程学习中面临挑战。为了了解这些学生的体验,笔者对面对面课程转为远程学习的学生进行了试点调查。本文报告了参与者反应分析的结果。由于意外地转向远程学习,参与者经历了各种好处和挑战。在此基础上,本文对远程学习的设计提出了一些建议。
{"title":"\"I Lost Track of Things\": Student Experiences of Remote Learning in the Covid-19 Pandemic","authors":"Chola Chhetri","doi":"10.1145/3368308.3415413","DOIUrl":"https://doi.org/10.1145/3368308.3415413","url":null,"abstract":"The world was hit by the Covid-19 pandemic in the beginning of 2020, which forced many educational institutions to shift their classroom-based or face-to-face courses to remote or online mode. Students, instructors and institutions had little time to prepare for this sudden, unanticipated shift. Students who prefer learning face-to-face with instructor in a classroom are more likely to face challenges in learning remotely. To understand the experiences of such students, the author conducted a pilot survey of students whose face-to-face courses were moved to remote learning. This paper reports on the results of the analysis of participant responses. Participants experienced a mix of benefits and challenges due to the unanticipated move to remote learning. Based on the findings, this paper makes some suggestions on the design of remote learning.","PeriodicalId":374890,"journal":{"name":"Proceedings of the 21st Annual Conference on Information Technology Education","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124861154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Assistance of Student by Web Services based on Annotations 基于注解的Web Services对学生的帮助
Pub Date : 2020-10-07 DOI: 10.1145/3368308.3415414
Omar Mazhoud, Anis Kalboussi, A. Kacem
We focus in our research on the annotative activity of learner because annotation practice is very common and omnipresent. While reading, learner usually uses comments, highlights, circles sections and posts it to annotate the consulted resources. So, we propose an approach of recommendation of web services from the learner's annotative activity to assist him in his learning activates. This process of recommendation is based on two preparatory phases: the phase of modelling learner's personality profile through analysis of annotation digital traces in learning environment realized through a profile constructor module and the phase of discovery of web services which can meet the goals of annotations made by learner via the web service discovery module. The evaluation of these two main modules (web service discovery module and profile constructor module) through empirical studies realized on groups of learners based on the Student's t-test showed significant results
我们之所以把研究重点放在学习者的注释活动上,是因为注释实践是非常普遍和无所不在的。在阅读过程中,学习者通常会使用评论、亮点、圈出部分,并将其贴出来作为参考资料的注解。因此,我们提出了一种从学习者的注释活动中推荐web服务的方法,以帮助学习者的学习活动。该推荐过程基于两个准备阶段:通过分析通过profile constructor模块实现的学习环境中的注释数字痕迹来建模学习者的个性轮廓阶段和通过web服务发现模块发现能够满足学习者标注目标的web服务阶段。基于Student’st检验,通过对学习者群体实现的实证研究对这两个主要模块(web服务发现模块和profile constructor模块)进行了显著性评价
{"title":"Assistance of Student by Web Services based on Annotations","authors":"Omar Mazhoud, Anis Kalboussi, A. Kacem","doi":"10.1145/3368308.3415414","DOIUrl":"https://doi.org/10.1145/3368308.3415414","url":null,"abstract":"We focus in our research on the annotative activity of learner because annotation practice is very common and omnipresent. While reading, learner usually uses comments, highlights, circles sections and posts it to annotate the consulted resources. So, we propose an approach of recommendation of web services from the learner's annotative activity to assist him in his learning activates. This process of recommendation is based on two preparatory phases: the phase of modelling learner's personality profile through analysis of annotation digital traces in learning environment realized through a profile constructor module and the phase of discovery of web services which can meet the goals of annotations made by learner via the web service discovery module. The evaluation of these two main modules (web service discovery module and profile constructor module) through empirical studies realized on groups of learners based on the Student's t-test showed significant results","PeriodicalId":374890,"journal":{"name":"Proceedings of the 21st Annual Conference on Information Technology Education","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133486873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Perceptions, Effectiveness, and Impact of a Dual Enrollment Cybersecurity Course 双重招生网络安全课程的认知、有效性和影响
Pub Date : 2020-10-07 DOI: 10.1145/3368308.3415436
Sandra Gorka, Alicia McNett, Jacob R. Miller, Bradley M. Webb
This poster provides a detailed overview of the data collected from a three year program designed to extend the cybersecurity education pipeline to high school students.
这张海报提供了从一个三年计划收集的数据的详细概述,该计划旨在将网络安全教育管道扩展到高中生。
{"title":"Perceptions, Effectiveness, and Impact of a Dual Enrollment Cybersecurity Course","authors":"Sandra Gorka, Alicia McNett, Jacob R. Miller, Bradley M. Webb","doi":"10.1145/3368308.3415436","DOIUrl":"https://doi.org/10.1145/3368308.3415436","url":null,"abstract":"This poster provides a detailed overview of the data collected from a three year program designed to extend the cybersecurity education pipeline to high school students.","PeriodicalId":374890,"journal":{"name":"Proceedings of the 21st Annual Conference on Information Technology Education","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129227687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
In Pursuit of CS-based Educational Content Suitable for Broader Audiences 追求适合广大受众的基于cs的教育内容
Pub Date : 2020-10-07 DOI: 10.1145/3368308.3415362
V. Winter, Judith Monarrez Diaz-Kelsey
The important role that technology will play in the future requires that IT literacy, IT fluency, and interest in IT careers, in particular, increase significantly in the near future. This study investigates relationships between a variety of student attributes (e.g., general educational interests, classroom behavior, and gender) and engagement with a set of introductory CS-based educational activities. The goal of the study is to gain a better understanding of how to design CS-based educational content that appeals to broader student populations. Among other findings, the study revealed (unsurprisingly) that interest in math played a significant role in the level of engagement for males having STEM-related interests, while interest in reading played a significant role in the level of engagement for females having non-STEM related interests. The most significant finding of the study was that females having non-STEM related interests engaged more extensively than all other student populations.
技术在未来将扮演的重要角色要求在不久的将来,IT素养、IT流畅性和对IT职业的兴趣,特别是,显著增加。本研究调查了学生的各种属性(如一般教育兴趣、课堂行为和性别)与参与一系列介绍性的基于cs的教育活动之间的关系。这项研究的目的是为了更好地理解如何设计基于计算机科学的教育内容,以吸引更广泛的学生群体。在其他发现中,研究显示(毫不奇怪),对数学的兴趣在具有stem相关兴趣的男性的参与水平中起着重要作用,而对阅读的兴趣在具有非stem相关兴趣的女性的参与水平中起着重要作用。该研究最重要的发现是,拥有非stem相关兴趣的女性比其他所有学生群体更广泛地参与其中。
{"title":"In Pursuit of CS-based Educational Content Suitable for Broader Audiences","authors":"V. Winter, Judith Monarrez Diaz-Kelsey","doi":"10.1145/3368308.3415362","DOIUrl":"https://doi.org/10.1145/3368308.3415362","url":null,"abstract":"The important role that technology will play in the future requires that IT literacy, IT fluency, and interest in IT careers, in particular, increase significantly in the near future. This study investigates relationships between a variety of student attributes (e.g., general educational interests, classroom behavior, and gender) and engagement with a set of introductory CS-based educational activities. The goal of the study is to gain a better understanding of how to design CS-based educational content that appeals to broader student populations. Among other findings, the study revealed (unsurprisingly) that interest in math played a significant role in the level of engagement for males having STEM-related interests, while interest in reading played a significant role in the level of engagement for females having non-STEM related interests. The most significant finding of the study was that females having non-STEM related interests engaged more extensively than all other student populations.","PeriodicalId":374890,"journal":{"name":"Proceedings of the 21st Annual Conference on Information Technology Education","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125053284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementing the IT-Transfer2020 Curriculum Guidance for Two-Year IT Transfer Programs 实施IT- transfer2020两年制IT转学课程指南
Pub Date : 2020-10-07 DOI: 10.1145/3368308.3415383
Markus Geissler, Mihaela Sabin, Cara Tang
Baccalaureate IT programs are revisiting their curriculum in response to the ACM/IEEE IT curricular recommendations in the IT2017 report. Consequently, two-year colleges will likely need to update their lower division IT transfer programs as well. IT-Transfer2020 uses the same methodology of competencies as IT2017 and IT2yr2014, and it organizes its 27 essential and 29 supplemental competencies within the ten essential and nine supplemental IT competency domains defined in IT2017. IT-Transfer2020 includes an analysis of congruence between its competencies and the IT2yr2014 learning outcomes to assist institutions looking to offer both transfer and applied two-year IT programs with structuring their course offerings. Two-year programs which follow either IT-Transfer2020 or IT2yr2014 are substantially congruent and would likely only need to differ by one or two courses to prepare students for entry-level positions after two years of study or analyst-level positions upon earning a bachelor's degree. IT-Transfer2020 echoes the IT2017 recommendations regarding mathematics and science content and contains an IT Transfer Articulation Worksheet to facilitate communication between transfer partner institutions as well as assessment rubrics to help with continuous assessment of an IT transfer program's quality. The ACM Committee for Computing Education in Community Colleges invites institutions to highlight their IT transfer program by submitting a program example at ccecc.acm.org/correlations.
为了响应ACM/IEEE在IT2017报告中的IT课程建议,学士学位IT课程正在重新审视他们的课程。因此,两年制大学可能也需要更新他们的低年级IT转学课程。it - transfer2020使用与IT2017和IT2yr2014相同的能力方法,并在IT2017中定义的10个基本和9个补充it能力领域中组织其27个基本和29个补充能力。IT- transfer2020包括对其能力与it2y2014学习成果之间一致性的分析,以帮助那些希望提供转学和应用两年制IT课程的机构构建他们的课程。遵循IT-Transfer2020或it2y2014的两年制课程基本上是一致的,可能只需要一到两门不同的课程,就可以为学生在学习两年后的入门级职位或获得学士学位后的分析师级别职位做好准备。IT- transfer2020响应了IT2017关于数学和科学内容的建议,并包含一个IT转移衔接工作表,以促进转移合作机构之间的沟通,以及评估规则,以帮助持续评估IT转移计划的质量。ACM社区大学计算机教育委员会邀请各大学通过在ccecc.acm.org/correlations上提交程序示例来突出其IT转学课程。
{"title":"Implementing the IT-Transfer2020 Curriculum Guidance for Two-Year IT Transfer Programs","authors":"Markus Geissler, Mihaela Sabin, Cara Tang","doi":"10.1145/3368308.3415383","DOIUrl":"https://doi.org/10.1145/3368308.3415383","url":null,"abstract":"Baccalaureate IT programs are revisiting their curriculum in response to the ACM/IEEE IT curricular recommendations in the IT2017 report. Consequently, two-year colleges will likely need to update their lower division IT transfer programs as well. IT-Transfer2020 uses the same methodology of competencies as IT2017 and IT2yr2014, and it organizes its 27 essential and 29 supplemental competencies within the ten essential and nine supplemental IT competency domains defined in IT2017. IT-Transfer2020 includes an analysis of congruence between its competencies and the IT2yr2014 learning outcomes to assist institutions looking to offer both transfer and applied two-year IT programs with structuring their course offerings. Two-year programs which follow either IT-Transfer2020 or IT2yr2014 are substantially congruent and would likely only need to differ by one or two courses to prepare students for entry-level positions after two years of study or analyst-level positions upon earning a bachelor's degree. IT-Transfer2020 echoes the IT2017 recommendations regarding mathematics and science content and contains an IT Transfer Articulation Worksheet to facilitate communication between transfer partner institutions as well as assessment rubrics to help with continuous assessment of an IT transfer program's quality. The ACM Committee for Computing Education in Community Colleges invites institutions to highlight their IT transfer program by submitting a program example at ccecc.acm.org/correlations.","PeriodicalId":374890,"journal":{"name":"Proceedings of the 21st Annual Conference on Information Technology Education","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127216827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Comparison of Tools and Libraries for In-Class Face Detection and Emotion Recognition 课堂人脸检测和情感识别的工具和库的比较
Pub Date : 2020-10-07 DOI: 10.1145/3368308.3415427
Alejandro Susillo Ridao, Yong Zheng
Human factors, such as emotions, have been demonstrated as influential factors in educational teaching and learning. In order to exploit the relationship between students' in-class emotions and their learning performance, our preliminary work in this paper aims to try and compare different tools and libraries for in-class face detection and emotion recognition. We deliver our findings and insights about the popular libraries for these purposes.
人的因素,如情绪,已被证明是影响教育教与学的因素。为了探究学生课堂情绪与学习表现之间的关系,本文的初步工作旨在尝试和比较不同的课堂人脸检测和情绪识别工具和库。为了这些目的,我们提供了关于流行库的发现和见解。
{"title":"A Comparison of Tools and Libraries for In-Class Face Detection and Emotion Recognition","authors":"Alejandro Susillo Ridao, Yong Zheng","doi":"10.1145/3368308.3415427","DOIUrl":"https://doi.org/10.1145/3368308.3415427","url":null,"abstract":"Human factors, such as emotions, have been demonstrated as influential factors in educational teaching and learning. In order to exploit the relationship between students' in-class emotions and their learning performance, our preliminary work in this paper aims to try and compare different tools and libraries for in-class face detection and emotion recognition. We deliver our findings and insights about the popular libraries for these purposes.","PeriodicalId":374890,"journal":{"name":"Proceedings of the 21st Annual Conference on Information Technology Education","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124647279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
DomainPKI DomainPKI
Pub Date : 2020-10-07 DOI: 10.1145/3368308.3415401
Xinli Wang, M. El-Said
Certificate Authority (CA) is a single point of failure in the trust model of X.509 Public Key Infrastructure (PKI), since CA is the only entity to sign and distribute public key certificates and no one else is involved in certificate verification. In response, recent fixes based on public logs have been successful in making certificate management more transparent and publicly verifiable. However, more recent researches have shown that none of existing solutions is fully satisfactory due to different security flaws and operational challenges. In this study, we propose a domain-aware alternative to mitigate those issues by involving domain owner in digital signature and certificate verification. Our proposal is based on current PKI design and business model with critical extensions of domain awareness. In order to engage domain owner in its certificate verification, we propose that each domain maintains its own certificate logs. A certificate is co-signed by a CA and its domain with a domain master key. To prove the authenticity of a certificate, a client first verifies the CA's digital signature, then the domain signature, and finally sends a query about the certificate status to its domain owner for further confirmation. By engaging domain owner in co-signing and verifying its certificates, we distribute the trust for certificate authenticity between the CA that signed this certificate and its domain owner. With these extensions, it will be extremely hard, if not impossible, for an adversary to make a successful attack to a client, and the damage of a successful attack is limited to this single client only. In this paper, we present a framework of our proposal, analyze its security gains and compare it with existing solutions.
{"title":"DomainPKI","authors":"Xinli Wang, M. El-Said","doi":"10.1145/3368308.3415401","DOIUrl":"https://doi.org/10.1145/3368308.3415401","url":null,"abstract":"Certificate Authority (CA) is a single point of failure in the trust model of X.509 Public Key Infrastructure (PKI), since CA is the only entity to sign and distribute public key certificates and no one else is involved in certificate verification. In response, recent fixes based on public logs have been successful in making certificate management more transparent and publicly verifiable. However, more recent researches have shown that none of existing solutions is fully satisfactory due to different security flaws and operational challenges. In this study, we propose a domain-aware alternative to mitigate those issues by involving domain owner in digital signature and certificate verification. Our proposal is based on current PKI design and business model with critical extensions of domain awareness. In order to engage domain owner in its certificate verification, we propose that each domain maintains its own certificate logs. A certificate is co-signed by a CA and its domain with a domain master key. To prove the authenticity of a certificate, a client first verifies the CA's digital signature, then the domain signature, and finally sends a query about the certificate status to its domain owner for further confirmation. By engaging domain owner in co-signing and verifying its certificates, we distribute the trust for certificate authenticity between the CA that signed this certificate and its domain owner. With these extensions, it will be extremely hard, if not impossible, for an adversary to make a successful attack to a client, and the damage of a successful attack is limited to this single client only. In this paper, we present a framework of our proposal, analyze its security gains and compare it with existing solutions.","PeriodicalId":374890,"journal":{"name":"Proceedings of the 21st Annual Conference on Information Technology Education","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115085171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Proceedings of the 21st Annual Conference on Information Technology Education
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1