{"title":"Session details: SIGITE Paper Session 1","authors":"Bonnie Kang","doi":"10.1145/3257770","DOIUrl":"https://doi.org/10.1145/3257770","url":null,"abstract":"","PeriodicalId":431742,"journal":{"name":"Proceedings of the 16th Annual Conference on Information Technology Education","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128418954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
We have developed a collection of instructional hands-on lab assignments that can be used to help teach security courses or courses with a security component in information technology (IT). Our labs cover a wide spectrum of principles, ideas and technologies along with well-developed open source tools. Lab descriptions are publicly accessible from our web page. All of the labs have been tested in a virtual environment and utilized in our security courses. Feedback from the students has been positive. In this paper, we will present the lab design, topics covered in our labs, lab environments and student evaluation results. We will share our experience in transferring advanced technology to IT security education and lessons learned from this practice.
{"title":"Hands-on Exercises for IT Security Education","authors":"Xinli Wang, Yan Bai, G. Hembroff","doi":"10.1145/2808006.2808023","DOIUrl":"https://doi.org/10.1145/2808006.2808023","url":null,"abstract":"We have developed a collection of instructional hands-on lab assignments that can be used to help teach security courses or courses with a security component in information technology (IT). Our labs cover a wide spectrum of principles, ideas and technologies along with well-developed open source tools. Lab descriptions are publicly accessible from our web page. All of the labs have been tested in a virtual environment and utilized in our security courses. Feedback from the students has been positive. In this paper, we will present the lab design, topics covered in our labs, lab environments and student evaluation results. We will share our experience in transferring advanced technology to IT security education and lessons learned from this practice.","PeriodicalId":431742,"journal":{"name":"Proceedings of the 16th Annual Conference on Information Technology Education","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133015529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: SIGITE Paper Session 6","authors":"Xinli Wang","doi":"10.1145/3257777","DOIUrl":"https://doi.org/10.1145/3257777","url":null,"abstract":"","PeriodicalId":431742,"journal":{"name":"Proceedings of the 16th Annual Conference on Information Technology Education","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123836606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: SIGITE Paper Session 8","authors":"K. Patten","doi":"10.1145/3257780","DOIUrl":"https://doi.org/10.1145/3257780","url":null,"abstract":"","PeriodicalId":431742,"journal":{"name":"Proceedings of the 16th Annual Conference on Information Technology Education","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116012194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: SIGITE Paper Session 5","authors":"Baijian (Justin) Yang","doi":"10.1145/3257775","DOIUrl":"https://doi.org/10.1145/3257775","url":null,"abstract":"","PeriodicalId":431742,"journal":{"name":"Proceedings of the 16th Annual Conference on Information Technology Education","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116177352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Since the "2008 Curriculum Guidelines for Undergraduate Degree Programs in Information Technology" report was published, it has been acknowledged that capstone courses play an important role in the Information Technology curriculum. As we move into the future, we need to reconsider what should go into a capstone course. The Curriculum Guidelines report discussed multicultural in terms of disciplines, but among employers today, multicultural often means multinational. Further, beginning with the Standish Group's CHAOS report and continuing with the introduction of Agile project development, industry has wrestled with dynamic software development environments. Balancing the need to deliver projects on time, on budget, and on spec with changing requirements and resources can be an overwhelming task for project managers and IT professionals. This paper describes a new type of capstone course that attempts to expose students to the realities of project development in the 21st century and equip the students to deal with them.
{"title":"Industry-Emulated Projects in the Classroom","authors":"S. Zilora","doi":"10.1145/2808006.2808029","DOIUrl":"https://doi.org/10.1145/2808006.2808029","url":null,"abstract":"Since the \"2008 Curriculum Guidelines for Undergraduate Degree Programs in Information Technology\" report was published, it has been acknowledged that capstone courses play an important role in the Information Technology curriculum. As we move into the future, we need to reconsider what should go into a capstone course. The Curriculum Guidelines report discussed multicultural in terms of disciplines, but among employers today, multicultural often means multinational. Further, beginning with the Standish Group's CHAOS report and continuing with the introduction of Agile project development, industry has wrestled with dynamic software development environments. Balancing the need to deliver projects on time, on budget, and on spec with changing requirements and resources can be an overwhelming task for project managers and IT professionals. This paper describes a new type of capstone course that attempts to expose students to the realities of project development in the 21st century and equip the students to deal with them.","PeriodicalId":431742,"journal":{"name":"Proceedings of the 16th Annual Conference on Information Technology Education","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127026311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents a study on two aspects of Computer Science and Information Technology Open Educational Resources (CS/IT OER) conducted in the CS OER Portal, a reference repository of CS/IT open educational resources. The first aspect focuses on the scope, scale and progress of CS/IT OER development. Here we present a statistical characterization of OER aimed at adding to our understanding of their potential for Computer Science and IT teaching and learning and of the impact of the observed trends. The second aspect focuses on obtaining empirical evidence on how people use search and browsing when presented with interfaces providing several alternatives for exploring content.
{"title":"CS/IT OER: Availability, Discoverability and Use","authors":"D. Dicheva, Christo Dichev","doi":"10.1145/2808006.2808019","DOIUrl":"https://doi.org/10.1145/2808006.2808019","url":null,"abstract":"This paper presents a study on two aspects of Computer Science and Information Technology Open Educational Resources (CS/IT OER) conducted in the CS OER Portal, a reference repository of CS/IT open educational resources. The first aspect focuses on the scope, scale and progress of CS/IT OER development. Here we present a statistical characterization of OER aimed at adding to our understanding of their potential for Computer Science and IT teaching and learning and of the impact of the observed trends. The second aspect focuses on obtaining empirical evidence on how people use search and browsing when presented with interfaces providing several alternatives for exploring content.","PeriodicalId":431742,"journal":{"name":"Proceedings of the 16th Annual Conference on Information Technology Education","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123431296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A project implemented in an undergraduate network management course is presented in this paper. The goal is to help students broaden their vision beyond what they have learned in class. Students can either select a theoretical research project to investigate a specific issue or a hands-on project to conduct experiments in the field of network management. During the semester, students were required to submit a project proposal, make a project presentation, and write a project report. A survey was conducted in the end of the semester to evaluate the effectiveness of the project implementation. We expect the analysis results of the survey to help student learning in future classes.
{"title":"Theoretical Research Project vs. Hands-on Project in a Network Management Course","authors":"T. Chou, Evan Hoke","doi":"10.1145/2808006.2808026","DOIUrl":"https://doi.org/10.1145/2808006.2808026","url":null,"abstract":"A project implemented in an undergraduate network management course is presented in this paper. The goal is to help students broaden their vision beyond what they have learned in class. Students can either select a theoretical research project to investigate a specific issue or a hands-on project to conduct experiments in the field of network management. During the semester, students were required to submit a project proposal, make a project presentation, and write a project report. A survey was conducted in the end of the semester to evaluate the effectiveness of the project implementation. We expect the analysis results of the survey to help student learning in future classes.","PeriodicalId":431742,"journal":{"name":"Proceedings of the 16th Annual Conference on Information Technology Education","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124349963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Despite a rebound in enrollments, men of color and women remain underrepresented in computing. The literature indicates that student-student interaction and affinity for the computing major are important factors for retention of underrepresented groups in computing, and learning communities connect students with each other and faculty to improve collaboration, interaction, enthusiasm. Despite their long history and promise for addressing retention, computing-focused learning communities remain rare. Here we present an evaluation of a linked-courses learning community for men of color and women majoring in a development-focused area of computing. We measure student attitudes and affinity for their major via a survey developed by the authors. Our results show that learning community students felt significantly more supported and were more likely to report that they belonged to a community of programmers than other students enrolled in the same programming class.
{"title":"Evaluating a Linked-courses Learning Community for Development Majors","authors":"Amber Settle, J. Lalor, Theresa A. Steinbach","doi":"10.1145/2808006.2808031","DOIUrl":"https://doi.org/10.1145/2808006.2808031","url":null,"abstract":"Despite a rebound in enrollments, men of color and women remain underrepresented in computing. The literature indicates that student-student interaction and affinity for the computing major are important factors for retention of underrepresented groups in computing, and learning communities connect students with each other and faculty to improve collaboration, interaction, enthusiasm. Despite their long history and promise for addressing retention, computing-focused learning communities remain rare. Here we present an evaluation of a linked-courses learning community for men of color and women majoring in a development-focused area of computing. We measure student attitudes and affinity for their major via a survey developed by the authors. Our results show that learning community students felt significantly more supported and were more likely to report that they belonged to a community of programmers than other students enrolled in the same programming class.","PeriodicalId":431742,"journal":{"name":"Proceedings of the 16th Annual Conference on Information Technology Education","volume":"54 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131443486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: SIGITE Lightning Talk 3","authors":"M. Stinson","doi":"10.1145/3257779","DOIUrl":"https://doi.org/10.1145/3257779","url":null,"abstract":"","PeriodicalId":431742,"journal":{"name":"Proceedings of the 16th Annual Conference on Information Technology Education","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133944063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}