首页 > 最新文献

Proceedings of the 16th Annual Conference on Information Technology Education最新文献

英文 中文
The Cyber Education Project and IT IAS Curriculum 网络教育计划与资讯科技资讯系统课程
Pub Date : 2015-09-29 DOI: 10.1145/2808006.2808035
Jessica M. Richards, J. Ekstrom
The Cyber Education Project (CEP) is an initiative to develop undergraduate curriculum guidelines and a case for accreditation for a baccalaureate in "Cyber Sciences" (The Cyber Education Project, 2015). The Learning Outcomes Working Group (LOWG) is in the process of creating a "taxonomy" and a set of "learning outcomes" for this baccalaureate program. In this document we examine concepts from the disciplines of linguistics, terminology management, knowledge management and ontology development that help illuminate the challenges involved with creating and managing the vocabulary we use to communicate about technical topics. We discuss how the concepts of ambiguity and terminology apply to the CEP and the issues of creating and managing a controlled vocabulary to support a field of study. We discuss the magnitude of the LOWG work by providing general characteristics of 31 glossaries and 5 different taxonomies or Bodies of Knowledge proposed by "Cyber Security" related organizations. These include the IAS knowledge areas from IT2008 and CS2013 which have begun to diverge. Finally we conclude with some suggestions of how to approach the creating and managing a vocabulary for Cyber Sciences without losing the connections to the source disciplines and how those source disciplines. IT curriculum must maintain consistency with the evolution of the Cyber Sciences or risk becoming an isolated silo whose IAS curriculum is isolated from an evolving Cyber Sciences community.
网络教育项目(CEP)是一项制定本科课程指南的倡议,也是“网络科学”学士学位认证的案例(网络教育项目,2015年)。学习成果工作组(LOWG)正在为这个学士学位课程创建一个“分类”和一套“学习成果”。在本文档中,我们研究了语言学、术语管理、知识管理和本体开发等学科的概念,这些概念有助于阐明创建和管理我们用于交流技术主题的词汇表所面临的挑战。我们将讨论歧义和术语的概念如何应用于CEP,以及创建和管理受控词汇表以支持研究领域的问题。我们通过提供由“网络安全”相关组织提出的31个词汇表和5个不同的分类法或知识体系的一般特征来讨论LOWG工作的重要性。其中包括IT2008和CS2013的IAS知识领域,它们已经开始出现分歧。最后,我们提出了一些建议,说明如何在不失去与源学科的联系的情况下为网络科学创建和管理词汇表,以及这些源学科如何。IT课程必须与网络科学的发展保持一致,否则就有可能成为一个孤立的筒仓,其IAS课程与不断发展的网络科学社区相隔离。
{"title":"The Cyber Education Project and IT IAS Curriculum","authors":"Jessica M. Richards, J. Ekstrom","doi":"10.1145/2808006.2808035","DOIUrl":"https://doi.org/10.1145/2808006.2808035","url":null,"abstract":"The Cyber Education Project (CEP) is an initiative to develop undergraduate curriculum guidelines and a case for accreditation for a baccalaureate in \"Cyber Sciences\" (The Cyber Education Project, 2015). The Learning Outcomes Working Group (LOWG) is in the process of creating a \"taxonomy\" and a set of \"learning outcomes\" for this baccalaureate program. In this document we examine concepts from the disciplines of linguistics, terminology management, knowledge management and ontology development that help illuminate the challenges involved with creating and managing the vocabulary we use to communicate about technical topics. We discuss how the concepts of ambiguity and terminology apply to the CEP and the issues of creating and managing a controlled vocabulary to support a field of study. We discuss the magnitude of the LOWG work by providing general characteristics of 31 glossaries and 5 different taxonomies or Bodies of Knowledge proposed by \"Cyber Security\" related organizations. These include the IAS knowledge areas from IT2008 and CS2013 which have begun to diverge. Finally we conclude with some suggestions of how to approach the creating and managing a vocabulary for Cyber Sciences without losing the connections to the source disciplines and how those source disciplines. IT curriculum must maintain consistency with the evolution of the Cyber Sciences or risk becoming an isolated silo whose IAS curriculum is isolated from an evolving Cyber Sciences community.","PeriodicalId":431742,"journal":{"name":"Proceedings of the 16th Annual Conference on Information Technology Education","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115458939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Usability Evaluation: Learning When Method Findings Converge--And When They Don't 可用性评估:学习方法发现何时一致,何时不一致
Pub Date : 2015-09-29 DOI: 10.1145/2808006.2808027
Craig S. Miller
This paper analyzes student learning in the context of a methods-oriented human-computer interaction course. In this course, students conduct expert inspection methods and usability tests. They then compare their findings across the methods and with other evaluators. Student assessments of their assignments and solicited comments suggest how comparing findings helps them learn the relative benefits of each of the methods. Modifications to this approach are discussed for diverse courses where coverage of HCI content may be more limited.
本文以一门以方法为导向的人机交互课程为背景,对学生的学习进行分析。在本课程中,学生进行专家检验方法和可用性测试。然后,他们将自己的发现与其他评估人员进行比较。学生对作业的评估和征求的意见表明,比较研究结果如何帮助他们了解每种方法的相对优势。本文讨论了不同课程对这种方法的修改,这些课程中HCI内容的覆盖范围可能更有限。
{"title":"Usability Evaluation: Learning When Method Findings Converge--And When They Don't","authors":"Craig S. Miller","doi":"10.1145/2808006.2808027","DOIUrl":"https://doi.org/10.1145/2808006.2808027","url":null,"abstract":"This paper analyzes student learning in the context of a methods-oriented human-computer interaction course. In this course, students conduct expert inspection methods and usability tests. They then compare their findings across the methods and with other evaluators. Student assessments of their assignments and solicited comments suggest how comparing findings helps them learn the relative benefits of each of the methods. Modifications to this approach are discussed for diverse courses where coverage of HCI content may be more limited.","PeriodicalId":431742,"journal":{"name":"Proceedings of the 16th Annual Conference on Information Technology Education","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124275836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: SIGITE Paper Session 7 会议详情:SIGITE论文会议7
M. Stinson
{"title":"Session details: SIGITE Paper Session 7","authors":"M. Stinson","doi":"10.1145/3257778","DOIUrl":"https://doi.org/10.1145/3257778","url":null,"abstract":"","PeriodicalId":431742,"journal":{"name":"Proceedings of the 16th Annual Conference on Information Technology Education","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116202487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Education and Entrepreneurs: From University to "Shark Tank" 教育与企业家:从大学到“创智赢家”
Pub Date : 2015-09-29 DOI: 10.1145/2808006.2808007
M. Shannon
According to the US government, entrepreneurs drive America's economy and account for the majority of the nation's new job creation and innovation in every industry. Inspiration for new business ideas are found in a personal pain point, listening to complaints from friends and family, observing what's going on around you, having preexisting expertise in an industry, technology, or process, or seeing a gap in the latest "hot" businesses or industries. Many ideas are only able to become opportunities through the strategic use of technology. An excellent example is Packback, an e-learning company that is disrupting the textbook business model and helping facilitate rich student discussion. The company was founded by four university students in their junior year to address a common complaint among their peers and professors and began their business by winning their university's new business competition. This keynote will highlight one of Packback's founder's experience, from co-working at 1871, Chicago's hub for start-ups, through a unique opportunity on Shark Tank and and discuss how education has brought value to the success of Packback.
根据美国政府的说法,企业家推动着美国经济的发展,并在每个行业创造了大部分的就业机会和创新。新商业理念的灵感来自于个人痛点,倾听朋友和家人的抱怨,观察周围发生的事情,在行业,技术或流程中已有的专业知识,或者看到最新“热门”业务或行业的差距。许多想法只有通过战略性地使用技术才能成为机会。一个很好的例子是电子学习公司Packback,它正在颠覆教科书的商业模式,并帮助促进丰富的学生讨论。该公司是由四名大学三年级的学生为了解决同学和教授的普遍抱怨而创建的,他们在学校的新商业竞赛中获胜后开始创业。本次主题演讲将重点介绍Packback创始人的经历,从在芝加哥创业中心1871的共同工作,到Shark Tank的独特机会,并讨论教育如何为Packback的成功带来价值。
{"title":"Education and Entrepreneurs: From University to \"Shark Tank\"","authors":"M. Shannon","doi":"10.1145/2808006.2808007","DOIUrl":"https://doi.org/10.1145/2808006.2808007","url":null,"abstract":"According to the US government, entrepreneurs drive America's economy and account for the majority of the nation's new job creation and innovation in every industry. Inspiration for new business ideas are found in a personal pain point, listening to complaints from friends and family, observing what's going on around you, having preexisting expertise in an industry, technology, or process, or seeing a gap in the latest \"hot\" businesses or industries. Many ideas are only able to become opportunities through the strategic use of technology. An excellent example is Packback, an e-learning company that is disrupting the textbook business model and helping facilitate rich student discussion. The company was founded by four university students in their junior year to address a common complaint among their peers and professors and began their business by winning their university's new business competition. This keynote will highlight one of Packback's founder's experience, from co-working at 1871, Chicago's hub for start-ups, through a unique opportunity on Shark Tank and and discuss how education has brought value to the success of Packback.","PeriodicalId":431742,"journal":{"name":"Proceedings of the 16th Annual Conference on Information Technology Education","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125963786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: SIGITE Paper Session 10 会议详情:SIGITE论文会议10
B. Lunt
{"title":"Session details: SIGITE Paper Session 10","authors":"B. Lunt","doi":"10.1145/3257782","DOIUrl":"https://doi.org/10.1145/3257782","url":null,"abstract":"","PeriodicalId":431742,"journal":{"name":"Proceedings of the 16th Annual Conference on Information Technology Education","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129060068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber Education: A Multi-Level, Multi-Discipline Approach 网络教育:多层次、多学科的方法
Pub Date : 2015-09-29 DOI: 10.1145/2808006.2808038
E. Sobiesk, J. Blair, G. Conti, Michael Lanham, Howard Taylor
The purpose of this paper is to contribute to the emerging dialogue on the direction, content, and techniques involved in cyber education. The principle contributions of this work include a discussion on the definition of cyber and then a description of a multi-level, multi-discipline approach to cyber education with the goal of providing all educated individuals a level of cyber education appropriate for their role in society. Our work assumes cyber education includes technical and non-technical content at all levels. Our model formally integrates cyber throughout an institution's entire curriculum including within the required general education program, cyber-related electives, cyber threads, cyber minors, cyber-related majors, and cyber enrichment opportunities, collectively providing the foundational knowledge, skills, and abilities needed to succeed in the 21st Century Cyber Domain. To demonstrate one way of instantiating our multi-level, multi-discipline approach, we describe how it is implemented at our institution. Overall, this paper serves as a call for further discussion, debate, and effort on the topic of cyber education as well as describing our innovative model for cyber pedagogy.
本文的目的是为网络教育的方向、内容和技术的新兴对话做出贡献。这项工作的主要贡献包括对网络定义的讨论,然后描述了一种多层次、多学科的网络教育方法,其目标是为所有受过教育的个人提供适合其社会角色的网络教育水平。我们的工作假设网络教育包括所有层次的技术和非技术内容。我们的模式将网络正式整合到一个机构的整个课程中,包括必要的通识教育项目、网络相关选修课、网络专题、网络未成年人、网络相关专业和网络丰富机会,共同提供在21世纪网络领域取得成功所需的基础知识、技能和能力。为了演示一种实例化我们多层次、多学科方法的方法,我们描述了它是如何在我们的机构中实现的。综上所述,本文旨在呼吁对网络教育这一主题进行进一步的讨论、辩论和努力,并描述我们的网络教学创新模式。
{"title":"Cyber Education: A Multi-Level, Multi-Discipline Approach","authors":"E. Sobiesk, J. Blair, G. Conti, Michael Lanham, Howard Taylor","doi":"10.1145/2808006.2808038","DOIUrl":"https://doi.org/10.1145/2808006.2808038","url":null,"abstract":"The purpose of this paper is to contribute to the emerging dialogue on the direction, content, and techniques involved in cyber education. The principle contributions of this work include a discussion on the definition of cyber and then a description of a multi-level, multi-discipline approach to cyber education with the goal of providing all educated individuals a level of cyber education appropriate for their role in society. Our work assumes cyber education includes technical and non-technical content at all levels. Our model formally integrates cyber throughout an institution's entire curriculum including within the required general education program, cyber-related electives, cyber threads, cyber minors, cyber-related majors, and cyber enrichment opportunities, collectively providing the foundational knowledge, skills, and abilities needed to succeed in the 21st Century Cyber Domain. To demonstrate one way of instantiating our multi-level, multi-discipline approach, we describe how it is implemented at our institution. Overall, this paper serves as a call for further discussion, debate, and effort on the topic of cyber education as well as describing our innovative model for cyber pedagogy.","PeriodicalId":431742,"journal":{"name":"Proceedings of the 16th Annual Conference on Information Technology Education","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129712257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
A Preliminary Investigation of Container-Based Virtualization in Information Technology Education 基于容器的虚拟化在信息技术教育中的初步探讨
Pub Date : 2015-09-29 DOI: 10.1145/2808006.2808021
Keyuan Jiang, Qunhao Song
Delivery of an Information Technology curriculum involves utilization of a variety of technologies. Currently hypervisor-based virtualization is widely adopted in classroom and laboratory, satisfying the needs of instructional delivery in Information Technology education. However, it brings new challenges in setting up, and executing on resource-limited hardware. Coupled with this is our situation of shared laboratory computers which have many computationally intensive software applications. To address the issues, we conducted a preliminary investigation of container-based virtualization for use in classroom and laboratory. Our study did discover advantages and limitations of using such an emerging new technology. Although the container-based virtualization does provide many benefits, our observation suggests that at the current stage, it is more appropriate to have a mixture of hypervisor-based and container-based virtualization in Information Technology education.
信息技术课程的传授涉及到各种技术的运用。目前,基于虚拟机的虚拟化被广泛应用于课堂和实验室,满足了信息技术教育教学交付的需要。然而,它给在资源有限的硬件上设置和执行带来了新的挑战。与此相结合的是我们的共享实验室计算机的情况,它有许多计算密集型的软件应用程序。为了解决这些问题,我们对在教室和实验室中使用的基于容器的虚拟化进行了初步调查。我们的研究确实发现了使用这种新兴技术的优点和局限性。尽管基于容器的虚拟化确实提供了许多好处,但我们的观察表明,在当前阶段,在信息技术教育中混合使用基于管理程序和基于容器的虚拟化更为合适。
{"title":"A Preliminary Investigation of Container-Based Virtualization in Information Technology Education","authors":"Keyuan Jiang, Qunhao Song","doi":"10.1145/2808006.2808021","DOIUrl":"https://doi.org/10.1145/2808006.2808021","url":null,"abstract":"Delivery of an Information Technology curriculum involves utilization of a variety of technologies. Currently hypervisor-based virtualization is widely adopted in classroom and laboratory, satisfying the needs of instructional delivery in Information Technology education. However, it brings new challenges in setting up, and executing on resource-limited hardware. Coupled with this is our situation of shared laboratory computers which have many computationally intensive software applications. To address the issues, we conducted a preliminary investigation of container-based virtualization for use in classroom and laboratory. Our study did discover advantages and limitations of using such an emerging new technology. Although the container-based virtualization does provide many benefits, our observation suggests that at the current stage, it is more appropriate to have a mixture of hypervisor-based and container-based virtualization in Information Technology education.","PeriodicalId":431742,"journal":{"name":"Proceedings of the 16th Annual Conference on Information Technology Education","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132974557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Session details: SIGITE Paper Session 2 会议详情:SIGITE论文会议2
L. Powell
{"title":"Session details: SIGITE Paper Session 2","authors":"L. Powell","doi":"10.1145/3257771","DOIUrl":"https://doi.org/10.1145/3257771","url":null,"abstract":"","PeriodicalId":431742,"journal":{"name":"Proceedings of the 16th Annual Conference on Information Technology Education","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115258381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Systems Administration at the Graduate Level: Defining the Undefined 研究生阶段的系统管理:定义未定义
Pub Date : 2015-09-29 DOI: 10.1145/2808006.2808040
D. Rowe, Samuel Moses, Laura Wilkinson
Systems administrators are to computers what a primary care specialist is to the human body. Their responsibilities include diagnosis, prescribing solutions, dealing with the challenges of aging to name but a few. They are a primary line of defense in maintaining system health and must be vigilant in identifying, classifying and removing a variety of threats. They have been needed since the dawn of computing and are everywhere in every business, industry, organization and market sector. Despite the critical role of systems administrators in our technological lives, the role of a systems administrator lacks a precise definition. In the context of education, what are the knowledge areas and skills required of systems administrators? How can these be taught and to what end? In this paper we present a senior/graduate level course in systems administration that has evolved over a three-year period. We include an instructional methodology, course outline and suggestions for lab content. We conclude with our observations and future plans for course development.
系统管理员之于计算机就像初级保健专家之于人体。他们的职责包括诊断、制定解决方案、应对衰老带来的挑战等等。它们是维护系统健康的主要防线,必须在识别、分类和消除各种威胁方面保持警惕。自计算机诞生以来,它们就一直被需要,并且在每个企业、行业、组织和市场部门中无处不在。尽管系统管理员在我们的技术生活中扮演着至关重要的角色,但系统管理员的角色缺乏精确的定义。在教育的背景下,系统管理员需要哪些知识领域和技能?如何教这些,目的是什么?在本文中,我们提出了一个高级/研究生水平的系统管理课程,它已经发展了三年的时间。我们包括教学方法、课程大纲和对实验内容的建议。我们总结了我们的观察和未来课程发展的计划。
{"title":"Systems Administration at the Graduate Level: Defining the Undefined","authors":"D. Rowe, Samuel Moses, Laura Wilkinson","doi":"10.1145/2808006.2808040","DOIUrl":"https://doi.org/10.1145/2808006.2808040","url":null,"abstract":"Systems administrators are to computers what a primary care specialist is to the human body. Their responsibilities include diagnosis, prescribing solutions, dealing with the challenges of aging to name but a few. They are a primary line of defense in maintaining system health and must be vigilant in identifying, classifying and removing a variety of threats. They have been needed since the dawn of computing and are everywhere in every business, industry, organization and market sector. Despite the critical role of systems administrators in our technological lives, the role of a systems administrator lacks a precise definition. In the context of education, what are the knowledge areas and skills required of systems administrators? How can these be taught and to what end? In this paper we present a senior/graduate level course in systems administration that has evolved over a three-year period. We include an instructional methodology, course outline and suggestions for lab content. We conclude with our observations and future plans for course development.","PeriodicalId":431742,"journal":{"name":"Proceedings of the 16th Annual Conference on Information Technology Education","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116355672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Practicing and Evaluating Soft Skills in IT Capstone Projects 在IT顶点项目中实践和评估软技能
Pub Date : 2015-09-29 DOI: 10.1145/2808006.2808041
Guangzhi Zheng, Chi Zhang, Lei Li
Information technology (IT) professionals have constantly stressed the importance of soft skills and used them as a key factor in hiring and career development. The soft skills are often difficult to be practiced and evaluated in IT curriculum, specifically in a subject or a skill focused course. We took on the challenge in an IT capstone course where students complete a term-long real-world team project. We redesigned the IT capstone course to systematically embed soft skill requirements in the team project, facilitate the training of soft skills, and evaluate students' soft skill competences. In this paper, we present our experiences and findings on curriculum improvement and students' soft skills development and assessment.
信息技术(IT)专业人士一直强调软技能的重要性,并将其作为招聘和职业发展的关键因素。软技能通常很难在IT课程中实践和评估,特别是在一个主题或技能为重点的课程中。我们在IT顶点课程中接受了挑战,学生需要完成一个长期的现实世界团队项目。我们重新设计了IT顶点课程,将软技能要求系统地嵌入到团队项目中,促进软技能的训练,评估学生的软技能能力。本文就课程改进和学生软技能开发与评价方面的经验与发现进行了阐述。
{"title":"Practicing and Evaluating Soft Skills in IT Capstone Projects","authors":"Guangzhi Zheng, Chi Zhang, Lei Li","doi":"10.1145/2808006.2808041","DOIUrl":"https://doi.org/10.1145/2808006.2808041","url":null,"abstract":"Information technology (IT) professionals have constantly stressed the importance of soft skills and used them as a key factor in hiring and career development. The soft skills are often difficult to be practiced and evaluated in IT curriculum, specifically in a subject or a skill focused course. We took on the challenge in an IT capstone course where students complete a term-long real-world team project. We redesigned the IT capstone course to systematically embed soft skill requirements in the team project, facilitate the training of soft skills, and evaluate students' soft skill competences. In this paper, we present our experiences and findings on curriculum improvement and students' soft skills development and assessment.","PeriodicalId":431742,"journal":{"name":"Proceedings of the 16th Annual Conference on Information Technology Education","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128270419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
期刊
Proceedings of the 16th Annual Conference on Information Technology Education
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1