首页 > 最新文献

Proceedings of the 21st Annual Conference on Information Technology Education最新文献

英文 中文
Understanding Barriers and Motivations of Non-Traditional Students Learning Programming in an Online CS1 Course 理解非传统学生在CS1在线课程中学习编程的障碍和动机
Pub Date : 2020-10-07 DOI: 10.1145/3368308.3415455
Farzana Rahman
Due to the increasing number of computing jobs and national demands, we are seeing a surge of non-traditional students (aged over 25), entering the online CS1 courses. We are at a large metropolitan public research university, where 30% of the students are non-traditional students. However, the online CS1 course usually consists of 70-75% of non-traditional students. We carried out a study in that course for the last 5 semesters where we interviewed non-traditional students to better understand their characteristics and how those are related to their learning goals and performance. This paper is an attempt to identify the unique characteristics of non-traditional students that can help Computing-ED researchers and admins to design online CS1 courses with appropriate pedagogy, so a better learning experience can be provided to them and their retention rates can be increased
由于越来越多的计算机工作和国家需求,我们看到非传统学生(25岁以上)进入在线CS1课程的人数激增。我们在一所大型的城市公立研究型大学,其中30%的学生是非传统学生。然而,在线CS1课程通常由70-75%的非传统学生组成。我们在过去的5个学期里对这门课程进行了一项研究,我们采访了非传统学生,以更好地了解他们的特点,以及这些特点与他们的学习目标和表现之间的关系。本文试图找出非传统学生的独特特征,以帮助计算机教育研究人员和管理人员设计适合的教学方法的在线CS1课程,从而为他们提供更好的学习体验,提高他们的保留率
{"title":"Understanding Barriers and Motivations of Non-Traditional Students Learning Programming in an Online CS1 Course","authors":"Farzana Rahman","doi":"10.1145/3368308.3415455","DOIUrl":"https://doi.org/10.1145/3368308.3415455","url":null,"abstract":"Due to the increasing number of computing jobs and national demands, we are seeing a surge of non-traditional students (aged over 25), entering the online CS1 courses. We are at a large metropolitan public research university, where 30% of the students are non-traditional students. However, the online CS1 course usually consists of 70-75% of non-traditional students. We carried out a study in that course for the last 5 semesters where we interviewed non-traditional students to better understand their characteristics and how those are related to their learning goals and performance. This paper is an attempt to identify the unique characteristics of non-traditional students that can help Computing-ED researchers and admins to design online CS1 courses with appropriate pedagogy, so a better learning experience can be provided to them and their retention rates can be increased","PeriodicalId":374890,"journal":{"name":"Proceedings of the 21st Annual Conference on Information Technology Education","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126064639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DomainPKI DomainPKI
Pub Date : 2020-10-07 DOI: 10.1145/3368308.3415401
Xinli Wang, M. El-Said
Certificate Authority (CA) is a single point of failure in the trust model of X.509 Public Key Infrastructure (PKI), since CA is the only entity to sign and distribute public key certificates and no one else is involved in certificate verification. In response, recent fixes based on public logs have been successful in making certificate management more transparent and publicly verifiable. However, more recent researches have shown that none of existing solutions is fully satisfactory due to different security flaws and operational challenges. In this study, we propose a domain-aware alternative to mitigate those issues by involving domain owner in digital signature and certificate verification. Our proposal is based on current PKI design and business model with critical extensions of domain awareness. In order to engage domain owner in its certificate verification, we propose that each domain maintains its own certificate logs. A certificate is co-signed by a CA and its domain with a domain master key. To prove the authenticity of a certificate, a client first verifies the CA's digital signature, then the domain signature, and finally sends a query about the certificate status to its domain owner for further confirmation. By engaging domain owner in co-signing and verifying its certificates, we distribute the trust for certificate authenticity between the CA that signed this certificate and its domain owner. With these extensions, it will be extremely hard, if not impossible, for an adversary to make a successful attack to a client, and the damage of a successful attack is limited to this single client only. In this paper, we present a framework of our proposal, analyze its security gains and compare it with existing solutions.
{"title":"DomainPKI","authors":"Xinli Wang, M. El-Said","doi":"10.1145/3368308.3415401","DOIUrl":"https://doi.org/10.1145/3368308.3415401","url":null,"abstract":"Certificate Authority (CA) is a single point of failure in the trust model of X.509 Public Key Infrastructure (PKI), since CA is the only entity to sign and distribute public key certificates and no one else is involved in certificate verification. In response, recent fixes based on public logs have been successful in making certificate management more transparent and publicly verifiable. However, more recent researches have shown that none of existing solutions is fully satisfactory due to different security flaws and operational challenges. In this study, we propose a domain-aware alternative to mitigate those issues by involving domain owner in digital signature and certificate verification. Our proposal is based on current PKI design and business model with critical extensions of domain awareness. In order to engage domain owner in its certificate verification, we propose that each domain maintains its own certificate logs. A certificate is co-signed by a CA and its domain with a domain master key. To prove the authenticity of a certificate, a client first verifies the CA's digital signature, then the domain signature, and finally sends a query about the certificate status to its domain owner for further confirmation. By engaging domain owner in co-signing and verifying its certificates, we distribute the trust for certificate authenticity between the CA that signed this certificate and its domain owner. With these extensions, it will be extremely hard, if not impossible, for an adversary to make a successful attack to a client, and the damage of a successful attack is limited to this single client only. In this paper, we present a framework of our proposal, analyze its security gains and compare it with existing solutions.","PeriodicalId":374890,"journal":{"name":"Proceedings of the 21st Annual Conference on Information Technology Education","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115085171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Teaching Web-Attacks on a Raspberry Pi Cyber Range 在树莓派网络范围教学网络攻击
Pub Date : 2020-10-07 DOI: 10.1145/3368308.3415364
Sang-Keun Oh, Nathaniel Stickney, Daniel Hawthorne-Madell, Suzanne J. Matthews
Cyber ranges are an important tool for teaching cyber security techniques. However, setting up a cyber range for classroom use can be costly. Prior work on lowering the cost of cyber ranges focuses on open source solutions and virtual machines. Yet, these solutions do not reduce the cost of physical components - namely, the underlying hardware used to build the range. In this paper, we describe a prototype cyber range built out of Raspberry Pis, a type of inexpensive single board computer. To illustrate the functionality of the range, we use Docker and Docker Swarm to deploy a vulnerable web server across four Raspberry Pi nodes and assess it in an undergraduate classroom. Our cyber range costs under $250.00 to build and consumes less than 25 Watts of power. We open-source our materials and provide pre-built Docker images on Docker Hub to enable others to use our work. Our results suggest that cyber ranges built using Raspberry Pi clusters can lower cost and enhance cyber security education.
网络靶场是教授网络安全技术的重要工具。然而,建立一个教室使用的网络范围可能是昂贵的。先前降低网络范围成本的工作主要集中在开源解决方案和虚拟机上。然而,这些解决方案并没有降低物理组件的成本——即用于构建该系列的底层硬件。在本文中,我们描述了一个由树莓派(一种廉价的单板计算机)构建的原型网络范围。为了说明该系列的功能,我们使用Docker和Docker Swarm在四个树莓派节点上部署一个易受攻击的web服务器,并在本科教室中对其进行评估。我们的网络系列成本低于250美元,功耗低于25瓦。我们将我们的材料开源,并在Docker Hub上提供预构建的Docker映像,以使其他人能够使用我们的工作。我们的研究结果表明,使用树莓派集群构建的网络范围可以降低成本并增强网络安全教育。
{"title":"Teaching Web-Attacks on a Raspberry Pi Cyber Range","authors":"Sang-Keun Oh, Nathaniel Stickney, Daniel Hawthorne-Madell, Suzanne J. Matthews","doi":"10.1145/3368308.3415364","DOIUrl":"https://doi.org/10.1145/3368308.3415364","url":null,"abstract":"Cyber ranges are an important tool for teaching cyber security techniques. However, setting up a cyber range for classroom use can be costly. Prior work on lowering the cost of cyber ranges focuses on open source solutions and virtual machines. Yet, these solutions do not reduce the cost of physical components - namely, the underlying hardware used to build the range. In this paper, we describe a prototype cyber range built out of Raspberry Pis, a type of inexpensive single board computer. To illustrate the functionality of the range, we use Docker and Docker Swarm to deploy a vulnerable web server across four Raspberry Pi nodes and assess it in an undergraduate classroom. Our cyber range costs under $250.00 to build and consumes less than 25 Watts of power. We open-source our materials and provide pre-built Docker images on Docker Hub to enable others to use our work. Our results suggest that cyber ranges built using Raspberry Pi clusters can lower cost and enhance cyber security education.","PeriodicalId":374890,"journal":{"name":"Proceedings of the 21st Annual Conference on Information Technology Education","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130185438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An Initial Survey of Deaf and Hard-of-Hearing Student Use of a Composite Screen Solution Utilizing Web Conferencing Software 聋哑和听力障碍学生使用网络会议软件的复合屏幕解决方案的初步调查
Pub Date : 2020-10-07 DOI: 10.1145/3368308.3415459
E. Weeden, Sharon Mason
Classroom learning must be addressed in order to provide an inclusive course experience for all students. This study examined the effectiveness of support structures for Deaf and Hard-of-Hearing (DHH) students in the form of a web conferencing system that allowed for a composite screen solution. Quantitative and qualitative data analysis indicated that DHH students rely on access services and accommodations such as sign language interpreting and priority seating in order to have access to content in a mainstream classroom. However, the usage by hearing students was higher than anticipated.
课堂学习必须解决,以便为所有学生提供包容性的课程体验。本研究以网络会议系统的形式考察了聋哑和听力障碍(DHH)学生的支持结构的有效性,该系统允许复合屏幕解决方案。定量和定性数据分析表明,DHH学生依赖于访问服务和住宿,如手语翻译和优先座位,以便能够访问主流教室的内容。然而,听力正常的学生的使用率比预期的要高。
{"title":"An Initial Survey of Deaf and Hard-of-Hearing Student Use of a Composite Screen Solution Utilizing Web Conferencing Software","authors":"E. Weeden, Sharon Mason","doi":"10.1145/3368308.3415459","DOIUrl":"https://doi.org/10.1145/3368308.3415459","url":null,"abstract":"Classroom learning must be addressed in order to provide an inclusive course experience for all students. This study examined the effectiveness of support structures for Deaf and Hard-of-Hearing (DHH) students in the form of a web conferencing system that allowed for a composite screen solution. Quantitative and qualitative data analysis indicated that DHH students rely on access services and accommodations such as sign language interpreting and priority seating in order to have access to content in a mainstream classroom. However, the usage by hearing students was higher than anticipated.","PeriodicalId":374890,"journal":{"name":"Proceedings of the 21st Annual Conference on Information Technology Education","volume":"280 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132060583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Lessons Learned from Teaching Cybersecurity Courses During Covid-19 2019冠状病毒病期间网络安全课程教学心得
Pub Date : 2020-10-07 DOI: 10.1145/3368308.3415394
Yan Bai, Chunming Gao, B. Goda
The coronavirus pandemic brings tremendous challenges to teaching cybersecurity courses online, from learning how to use different online teaching platforms to innovative instruction methodologies within two weeks. In this paper, we will present the lessons we learned in teaching both graduate and undergraduate cybersecurity courses during Covid-19.
新冠肺炎疫情给网络安全课程的在线教学带来了巨大挑战,从学习如何使用不同的在线教学平台到创新的教学方法,需要在两周内完成。在本文中,我们将介绍我们在Covid-19期间教授研究生和本科生网络安全课程的经验教训。
{"title":"Lessons Learned from Teaching Cybersecurity Courses During Covid-19","authors":"Yan Bai, Chunming Gao, B. Goda","doi":"10.1145/3368308.3415394","DOIUrl":"https://doi.org/10.1145/3368308.3415394","url":null,"abstract":"The coronavirus pandemic brings tremendous challenges to teaching cybersecurity courses online, from learning how to use different online teaching platforms to innovative instruction methodologies within two weeks. In this paper, we will present the lessons we learned in teaching both graduate and undergraduate cybersecurity courses during Covid-19.","PeriodicalId":374890,"journal":{"name":"Proceedings of the 21st Annual Conference on Information Technology Education","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133386843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Affordable Proctoring Method for Ad-hoc Off-campus Exams 负担得起的临时校外考试监考方法
Pub Date : 2020-10-07 DOI: 10.1145/3368308.3415421
N. Chotikakamthorn, Supawan Tassanaprasert
The problem of proctoring off-campus exams is considered. Under unexpected situation such as COVID-19 pandemics, for many university courses, high-stake summative exams must be conducted from student home as a result of lockdown and social distancing policies. This paper addresses the issue of how to proctor off-campus exams in this unprepared situation, where a few constraints limited the choices of possible solutions. A proctoring method was developed with the aim to provide a solution that can be applied as widely as possible under the constraints imposed on the situation. The method is based on free software and services. It makes use of only hardware and devices universally available among the target students. A proctoring concept based on the use of E-Cam and S-Cam, a procedure, as well as a portable cross-platform proctor monitoring tool have been developed and described. Results from applying the proposed tool and method to an actual off-campus exam has been reported and discussed. Lessons learned and suggestions are provided.
对校外考试监考问题进行了探讨。在新冠肺炎疫情等突发情况下,由于封锁和保持社交距离政策,许多大学课程必须在学生家中进行高风险的总结考试。本文讨论了如何在这种毫无准备的情况下监督校外考试,在这种情况下,一些约束限制了可能的解决方案的选择。开发了一种监督方法,目的是提供一种解决办法,在对情况施加限制的情况下,可以尽可能广泛地应用。该方法基于免费软件和服务。它只使用目标学生普遍可用的硬件和设备。基于E-Cam和S-Cam的监护概念、程序以及便携式跨平台监护监测工具的开发和描述。将所提出的工具和方法应用于实际的校外考试的结果已经报告和讨论。本文提供了经验教训和建议。
{"title":"Affordable Proctoring Method for Ad-hoc Off-campus Exams","authors":"N. Chotikakamthorn, Supawan Tassanaprasert","doi":"10.1145/3368308.3415421","DOIUrl":"https://doi.org/10.1145/3368308.3415421","url":null,"abstract":"The problem of proctoring off-campus exams is considered. Under unexpected situation such as COVID-19 pandemics, for many university courses, high-stake summative exams must be conducted from student home as a result of lockdown and social distancing policies. This paper addresses the issue of how to proctor off-campus exams in this unprepared situation, where a few constraints limited the choices of possible solutions. A proctoring method was developed with the aim to provide a solution that can be applied as widely as possible under the constraints imposed on the situation. The method is based on free software and services. It makes use of only hardware and devices universally available among the target students. A proctoring concept based on the use of E-Cam and S-Cam, a procedure, as well as a portable cross-platform proctor monitoring tool have been developed and described. Results from applying the proposed tool and method to an actual off-campus exam has been reported and discussed. Lessons learned and suggestions are provided.","PeriodicalId":374890,"journal":{"name":"Proceedings of the 21st Annual Conference on Information Technology Education","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123612669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Exploring the Use of XPath Queries for Automated Assessment of Student Web Development Projects 探索使用XPath查询对学生Web开发项目进行自动评估
Pub Date : 2020-10-07 DOI: 10.1145/3368308.3415389
Russell Thackston
Web development courses are core to Information Technology (IT) and Computer Science (CS) curriculums. As a result, hundreds of students each semester enroll in these courses to learn HTML, CSS, and JavaScript. This burdens faculty with the need to grade tens or hundreds of web assignments each semester. Few tools exist to automate the grading of such assignments. This research explores the use of XPath queries, which may be used to evaluate HTML documents due to their loose relationship to XML. A web application was constructed to graphically define XPath queries, then provided to web development faculty to regrade past assignments. Based on faculty feedback, it was determined that XPath queries are capable of limited grading of HTML document against past assignments. However, by designing new assignments tailored for automated grading and by enhancing the web application with additional features, it is clear a significant portion, if not all, of the HTML documents for a web development assignment may be automatically graded.
网络开发课程是信息技术(IT)和计算机科学(CS)课程的核心。因此,每学期都有数百名学生参加这些课程来学习HTML、CSS和JavaScript。这给教师带来了负担,因为他们需要每学期给几十个或几百个网络作业打分。很少有工具可以自动给这些作业评分。本研究探讨了XPath查询的使用,由于HTML文档与XML的关系松散,因此可以使用XPath查询来评估HTML文档。构建了一个web应用程序,以图形化地定义XPath查询,然后提供给web开发人员,以重新调整过去的作业。根据教员的反馈,XPath查询能够根据过去的作业对HTML文档进行有限的评分。然而,通过设计为自动评分量身定制的新作业,并通过使用附加功能增强web应用程序,很明显,如果不是全部,那么web开发作业的HTML文档的很大一部分可能会自动评分。
{"title":"Exploring the Use of XPath Queries for Automated Assessment of Student Web Development Projects","authors":"Russell Thackston","doi":"10.1145/3368308.3415389","DOIUrl":"https://doi.org/10.1145/3368308.3415389","url":null,"abstract":"Web development courses are core to Information Technology (IT) and Computer Science (CS) curriculums. As a result, hundreds of students each semester enroll in these courses to learn HTML, CSS, and JavaScript. This burdens faculty with the need to grade tens or hundreds of web assignments each semester. Few tools exist to automate the grading of such assignments. This research explores the use of XPath queries, which may be used to evaluate HTML documents due to their loose relationship to XML. A web application was constructed to graphically define XPath queries, then provided to web development faculty to regrade past assignments. Based on faculty feedback, it was determined that XPath queries are capable of limited grading of HTML document against past assignments. However, by designing new assignments tailored for automated grading and by enhancing the web application with additional features, it is clear a significant portion, if not all, of the HTML documents for a web development assignment may be automatically graded.","PeriodicalId":374890,"journal":{"name":"Proceedings of the 21st Annual Conference on Information Technology Education","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114213077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Managing Controlled Unclassified Information (CUI) in Research Institutions 科研机构受控非机密信息(CUI)管理
Pub Date : 2020-10-07 DOI: 10.1145/3368308.3415432
B. Yang, C. Ellis, Preston Smith
In order to operate in a regulated world, researchers need to ensure compliance with ever-evolving landscape of information security regulations and best practices. This work explains the challenges of Controlled Unclassified Information (CUI) and introduces a managed research ecosystem, REED+. The workflow of this cost effective framework is presented to demonstrate how controlled research data are processed to be compliant with one of the highest level of cybersecurity in a campus environment. The framework serves as a reference model for other institutions to support CUI research. The awareness and training program developed from this work will be shared with other institutions to build a bigger CUI ecosystem.
为了在一个受监管的世界中运作,研究人员需要确保遵守不断发展的信息安全法规和最佳实践。这项工作解释了受控非分类信息(CUI)的挑战,并介绍了一个管理研究生态系统,REED+。提出了这个成本效益框架的工作流程,以演示如何处理受控的研究数据,以符合校园环境中最高水平的网络安全之一。该框架可作为其他机构支持CUI研究的参考模型。从这项工作中制定的意识和培训计划将与其他机构共享,以建立更大的CUI生态系统。
{"title":"Managing Controlled Unclassified Information (CUI) in Research Institutions","authors":"B. Yang, C. Ellis, Preston Smith","doi":"10.1145/3368308.3415432","DOIUrl":"https://doi.org/10.1145/3368308.3415432","url":null,"abstract":"In order to operate in a regulated world, researchers need to ensure compliance with ever-evolving landscape of information security regulations and best practices. This work explains the challenges of Controlled Unclassified Information (CUI) and introduces a managed research ecosystem, REED+. The workflow of this cost effective framework is presented to demonstrate how controlled research data are processed to be compliant with one of the highest level of cybersecurity in a campus environment. The framework serves as a reference model for other institutions to support CUI research. The awareness and training program developed from this work will be shared with other institutions to build a bigger CUI ecosystem.","PeriodicalId":374890,"journal":{"name":"Proceedings of the 21st Annual Conference on Information Technology Education","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121517828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Profile of SIGITE/RIIT Authors, 2nd Ed. SIGITE/RIIT作者简介,第二版。
Pub Date : 2020-10-07 DOI: 10.1145/3368308.3415365
B. Lunt, D. Bogaard
The Special Interest Group in IT Education (SIGITE) was formed in 2003 and includes an annual conference, paper proceedings and poster presentations. Many authors and presenters from the first conference have continued to regularly publish in SIGITE and the community has continued to grow since this time. In this paper we performed an updated study[1] of SIGITE authors and their institutions. We have identified the number of publications by year and venue, and identified top contributing authors and institutions. In addition to presenting and discussing our findings, we are making a spreadsheet of raw data available for further analysis and research.
资讯科技教育特别兴趣小组(SIGITE)成立于2003年,包括年度会议、论文和海报展示。第一届会议的许多作者和演讲者继续定期在SIGITE上发表文章,自那时以来,该社区一直在不断发展。在本文中,我们对SIGITE作者及其机构进行了更新研究[1]。我们已经确定了按年份和地点划分的出版物数量,并确定了顶级贡献作者和机构。除了展示和讨论我们的发现之外,我们正在制作原始数据的电子表格,以供进一步分析和研究。
{"title":"A Profile of SIGITE/RIIT Authors, 2nd Ed.","authors":"B. Lunt, D. Bogaard","doi":"10.1145/3368308.3415365","DOIUrl":"https://doi.org/10.1145/3368308.3415365","url":null,"abstract":"The Special Interest Group in IT Education (SIGITE) was formed in 2003 and includes an annual conference, paper proceedings and poster presentations. Many authors and presenters from the first conference have continued to regularly publish in SIGITE and the community has continued to grow since this time. In this paper we performed an updated study[1] of SIGITE authors and their institutions. We have identified the number of publications by year and venue, and identified top contributing authors and institutions. In addition to presenting and discussing our findings, we are making a spreadsheet of raw data available for further analysis and research.","PeriodicalId":374890,"journal":{"name":"Proceedings of the 21st Annual Conference on Information Technology Education","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122724264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Creative Problem Solving and Applied Improvisation Techniques to Improve Soft Skills 运用创造性解决问题和应用即兴技巧来提高软技能
Pub Date : 2020-10-07 DOI: 10.1145/3368308.3415452
Russell E. McMahon
The ACM/IEEE Information Technology Curricula 2017 report has clearly stated that knowledge of the IT subject matter is not the only important aspect of a technical education. Teaching the 'soft' skills to technical people is just as important as learning the 'hard' skills. However, it is oftentimes left to the hiring company to fill in this void as most STEM related curricula are focused on the necessary science, math, and technical aspect of the related discipline. Creative problem-solving methodologies, design thinking, lateral thinking all tie into the use of improvisation. Companies are using the improvisation methods as a way of creating better collaborative teams and creating a work environment that says 'Yes' before 'No'. Improvisation training can help the rest of us to become better listeners, communicators, collaborators, innovators, and those who can focus on the organization or team story and not their own story.
ACM/IEEE信息技术课程2017报告明确指出,IT主题的知识并不是技术教育的唯一重要方面。向技术人员传授“软”技能与学习“硬”技能同样重要。然而,填补这一空白通常留给招聘公司,因为大多数STEM相关课程都侧重于相关学科的必要科学、数学和技术方面。创造性解决问题的方法、设计思维、横向思维都与即兴发挥有关。公司正在使用即兴创作的方法来创建更好的协作团队,并创造一个在“不”之前说“是”的工作环境。即兴表演训练可以帮助我们其他人成为更好的倾听者、沟通者、合作者、创新者,以及那些能够专注于组织或团队故事而不是自己故事的人。
{"title":"Using Creative Problem Solving and Applied Improvisation Techniques to Improve Soft Skills","authors":"Russell E. McMahon","doi":"10.1145/3368308.3415452","DOIUrl":"https://doi.org/10.1145/3368308.3415452","url":null,"abstract":"The ACM/IEEE Information Technology Curricula 2017 report has clearly stated that knowledge of the IT subject matter is not the only important aspect of a technical education. Teaching the 'soft' skills to technical people is just as important as learning the 'hard' skills. However, it is oftentimes left to the hiring company to fill in this void as most STEM related curricula are focused on the necessary science, math, and technical aspect of the related discipline. Creative problem-solving methodologies, design thinking, lateral thinking all tie into the use of improvisation. Companies are using the improvisation methods as a way of creating better collaborative teams and creating a work environment that says 'Yes' before 'No'. Improvisation training can help the rest of us to become better listeners, communicators, collaborators, innovators, and those who can focus on the organization or team story and not their own story.","PeriodicalId":374890,"journal":{"name":"Proceedings of the 21st Annual Conference on Information Technology Education","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116036701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of the 21st Annual Conference on Information Technology Education
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1