Learn About Computer Network Security - A Review
|
|
|
- Abel Hensley
- 5 years ago
- Views:
Transcription
1 Postprint This is the accepted version of a paper presented at International Conference on Learning and Teaching in Computing and Engineering (LaTiCE) 2014, April 2014, Kuching, Malaysia. Citation for the original published paper: Cambazoglu, V., Thota, N. (2013) Computer science students perception of computer network security. In: Proc. 1st International Conference on Learning and Teaching in Computing and Engineering (pp ). Los Alamitos, CA: IEEE Computer Society N.B. When citing this work, cite the original published paper. Permanent link to this version:
2 2013 Learning and Teaching in Computing and Engineering Computer Science Students Perception of Computer Network Security Volkan Cambazoglu Department of Information Technology Uppsala University, Uppsala, Sweden Neena Thota Faculty of Creative Industries University of Saint Joseph, Macau, S.A.R. Uppsala Computing Education Research Group, UpCERG Uppsala University, Uppsala, Sweden Abstract In the last decade, the progress of internet technologies has led to a significant increase in security and privacy issues for users. This study aims to investigate how computer science students perceive computer network security. Thirty three students participated in the study in which we gathered data through a questionnaire. In this paper, we present an analysis that is inspired by the phenomenographic approach. Our conclusion is that the students have different levels of understanding of computer network security depending on their usage of the concepts they have learned, their theoretical or practical orientation to the subject, and their interest in the field. Index Terms Computer Network Security; Computer Science Education Research I. INTRODUCTION Computer Networks Security (CNS) is becoming more important nowadays because of increasing demand for internet based technologies. The increase in users privacy concerns is related to the increasing use of the internet [1]. However, security mechanisms that prevent such issues might deteriorate a user s experience. A user might find these mechanisms cumbersome or unnecessary and neglect using them, which might lead to security breaches in certain systems or simply loss of privacy of the user. Computer Science (CS) students are expected to have a better understanding of CNS concepts/mechanisms than most other people. Students receive both theoretical and practical knowledge. However, an undergraduate student can learn about the theories in computer security, but may not be able to apply the knowledge in practice. On the other hand, a person, who receives certificate training, can practically apply the gained knowledge while lacking a deep theoretical understanding of security issues. If CS students have a hard time understanding or following a CNS concept/mechanism, then an ordinary person might experience the same problems as well. Therefore, the aim of this study is to capture how CS students perceive CNS. We explore what CS students know about CNS and how they approach it in their daily lives. In this paper, we report some of the results of an on-going analysis of the data that has been gathered. The rest of the paper is organized as follows. Related work is mentioned in section II and the methodology is described in section III. We share our findings in section IV and discuss in section V that CS students show increased awareness of CNS in five progressive stages. The paper concludes with the implications of the study. II. RELATED WORK Related work reviewed here focuses on the organization of courses to teach computer security and on a phenomenographic study that investigated students perceptions of network protocols. The increasing importance of network security issues has led universities and colleges to focus on the organization of programs to incorporate the fast developing area of information security [8] and to issue curricula guidelines for teaching [5]. Researchers/teachers think about what to teach in computer security courses and how to teach it [10]. The advantages and the disadvantages of different approaches to teaching computer security are a matter for discussion [3]. The related work on education in computer security seems to discuss the trade-off between theory and practice-based education in general [11]. University education aims to give students a broad understanding of theories in computer security; however the issues in computer security are highly practical in real life and require hands-on experience. [12] discusses how to mix theory and practice, in order to teach information security to students, so that the students can conform to the existing standards. These approaches can be traditional lecture, scribe, expert/mentor, tutorial, project, research/teaching synergy, and attack/defend isolated lab. The approaches are identified according to the audience s active/passive role in the course and the content of the course. Students conceptions of computer networking protocols have been investigated by [2] using a phenomenographic approach [6]. In this study, students participating in an internationally distributed project course were interviewed about their experience of three network protocols (TCP, UDP, and RMI). The study found similarities and also differences in students understanding of the protocols due to the contextual shifts in the students experiences. These understandings were also seen as related to the different characteristics and ideas behind the protocols. Four categories of the general concept of a network protocol were identified that showed critical differences in hierarchically qualitative ways of understanding /13 $ IEEE DOI /LaTiCE
3 a protocol. The more advanced understandings were deemed desirable from a learning perspective. It is with this study in mind, that we initiated the investigation of CS students understanding of CNS concepts. III. METHODOLOGY The participants in this study consisted of a mixed set of CS students having different levels of education and coming from different countries. Thirty three students (2 undergraduate, 19 master and 12 PhD students) participated. The students were from 12 countries: Australia, China, Colombia, Germany, India, Iran, Lithuania, Singapore, Spain, Sweden, Turkey and Vietnam. The majority of the students were from Uppsala University, Sweden. The participants have received previous degrees from their home countries or from Switzerland or the USA. Most of the participants are currently students, while others are recently graduated. In a phenomenographic study, data is collected through interviews. In this study, we invited the participants to fill in an online questionnaire that we prepared. There were two reasons why we chose a questionnaire as a data collection instrument: (a) the participants were located in different parts of the world and distributing an online questionnaire to people, who are located far apart, is a time and cost effective way of reaching them; (b) the participants from Sweden have different schedules and workloads and they could fill in the details in the online questionnaire at their convenience. In the questionnaire, we asked open questions about computer security with a focus on CNS. Text books and courses about computer security generally include a chapter/lecture about CNS. As CNS is a subtopic within computer security, we choose not to dive into it without referring to more general computer security concepts/mechanisms. Thus, we started with a few questions about computer security before leading to the CNS questions, which form the core of the study. In order to have an understanding of the profile of the participants, we also extracted some statistical data from the participants, such as exposure to computer security training and the duration of the training. The remaining answers were mostly expected as paragraph text, where the length of an answer depended on the knowledge and experience of the participant. In the questionnaire, we had branching so that participants could follow different questions depending on their answers to yes/no questions. After preparing the questionnaire, a pilot study was done with a PhD student whose focus is on CNS. The ambiguities in some of the questions were fixed by either rewriting the question or a help text accompanying the question. We intended to ask questions so that the participants felt they were being interviewed for their opinion, rather than being assessed for their knowledge of CNS concepts/mechanisms. We analyzed the participants answers using an approach inspired by phenomenography. We aim to understand how the phenomenon of CNS is experienced by the CS students. As Booth says, Different contents of learning and different types of learning task give rise to different kinds of opportunity for developing awareness [4]. We surmised that each student has a different degree of knowledge of CNS, encounters different events related to CNS, receives different kinds of education/training of CNS, and reaches different learning outcomes. For example, a concept can be understood in different ways by different students. While one student understands the concept with the help of an example, another student can directly understand from the theory itself. In another case, a student might not fully understand the concept; but just knows that one of his/her experiences comes from that concept. Therefore, with the help of phenomenographic methodology, a researcher observing these students can categorize how the concept or the phenomenon can be learnt or experienced in different ways [6]. The outcome of a phenomenographic analysis is a series of categories that focus on fundamental characteristics and preserve the specific content of the phenomena in the description [9]. These categories are exemplified with quotes so that the fundamental characteristics are illustrated with the specific content from the participants. IV. FINDINGS In this section, we share our findings from the questionnaire. Nine students have not taken any training in computer security. One student has studied computer security by him/herself. One student has had training in computer security at a company. Twenty two students have taken courses that are directly or indirectly related to computer security. A subset of 22 students has also had private seminars in computer security. After considering different, yet related questions (see the Appendix for the questions), we draw a high level categorization of the CS students perception of CNS. In this high level categorization, we have five categories in increasing order of deeper understanding. (1) Misconception or confusion, yet still know that something is important and attention must be paid: In this base category, we witness CS students that have learnt something about CNS; however, there is either confusion or misunderstanding in the gained knowledge. For example, a student thinks that Linux helps to secure one s communication from other people. I do not use any app for security but I use linux. Linux is just another operating system that has no guarantee for securing communication from other people. It might be more secure than other operating systems because of the market share or not being a favorite for attackers target. However, the student thinks that it is a way to secure communication from other people. (2) A vague idea of important security issues without understanding the reasoning behind them: In this category, the students use CNS mechanisms in daily life; however, they do not know the details of the knowledge they have learnt about CNS. For example, a student does not know why he/she pays attention to network security when connecting to a wireless network. Unlike students in the previous category, the student clearly knows that it is a good practice to be careful when connecting to a wireless network, 205
4 even though the reasons seem to be unknown. For example, a student said: I always think it is risky and not secure! (3) A high level theoretical understanding of security issues and their reasons: What is new in this category is that the students express themselves by consulting theories and concepts. Here, students give ideal explanations to CNS phenomena as a result of abstraction and high level understanding of CNS concepts. For example, a student thinks that wireless network security means a secure network where users do not have any doubt of losing privacy. Ideally, the network should be secured as the student thinks of, yet, it might not be in practice. For the theoretical way of thinking, an excerpt is: Security is a broad term, but the first three things that come to my mind are confidentiality (nobody other than the two parties should be able to read the communication), integrity (each party should be able to establish that a message has not been tampered with) and authenticity (each party should be able to establish the origin of a message). These aspects of security are often achieved by cryptography. (4) Both high level theoretical understanding and practical usage of the theories behind the security issues: In this category, the students reflect their knowledge both conceptually and practically. Here, we see that students make a claim and support it with an example. In contrast to the previous categories, here the students show deeper insight into learning and a consolidation of what is learnt. In other words, some students put their CNS knowledge in use in their daily lives. For example, a student explains that training in computer security has made him:...more aware of the risks involved in computer networking, especially wireless networking. Therefore, I use strict rules who is able to connect to my home network and use encryption. (5) High level theoretical understanding, practical usage of the theories behind the security issues, and also increased interest in the security field so that they can keep up-to-date with the new developments: The last category consists of students that are interested in CNS. These students know the theories, know how they are used practically, and also follow new developments in the field. CNS knowledge of these students evolves as a result of their interest in the field. This category introduces elements of personal insights and actions that deepen understanding gained from the previous categories relating to theoretical knowledge and practical application. An example for this category can be the statement made about a CNS course: It definitely increased my awareness and interest in the subject. So that, I occasionally read related articles or tutorials in order to keep my knowledge updated and to take necessary precautions. V. DISCUSSION The study aims to look for what CS students know about CNS and how they use that knowledge in daily life. In this section, we try to explain the students understandings in the light of their contextual experiences. The first two categories that we identified dealt with misconceptions or incomplete knowledge of CNS. The last three categorise showed increasing theoretical knowledge, practical usage, and personal motivation in learning. This distinction is in line with other findings presented in [7] that show that students learning progresses from a surface to more inclusive or deeper ways of learning. We noticed that most of the participants have learnt about computer security and/or CNS in some way and are aware of the CNS issues. Only a couple of students mentioned that they have not studied CNS or computer security before; hence these students are not aware of the CNS or computer security issues present in real-life. If a student confuses or does not remember things from the course taken, it might mean that the student does not need that knowledge in his/her daily life. When such knowledge is frequently used, it remains within the focal awareness [7] of the student. The difference between practical and theoretical ways of understanding CNS concepts can also be dependent on the kind of education/training the students have received. Some of the participants might think more practically than others because of private seminars or training at a company or through self-training. These students might even have taken computer security courses/classes at the university, yet they might be more technically oriented than other students. On the other hand, some of the participants can be more theoretically oriented than others because of university education. We also observe the factor of interest among the answers to the questionnaire. Some of the students are definitely more interested in computer security or CNS subjects than some others. These students look for details when studying CNS and follow new developments to be up-to-date. CNS is a subject that goes through great and rapid change. While interested students follow these changes, other students either learn about the changes as they encounter them, or they give up on the security issues. VI. CONCLUSION AND IMPLICATIONS In this paper, we have described how CS students perceive CNS. We looked for the knowledge that the students have in order to understand how much they know about CNS in general and how this knowledge affects them in daily life. As a result of our questionnaire based survey among an international set of CS students, we deduced five categories that represent increased understanding of CS students perception of CNS. We have interpreted these in terms of contextual influences on students learning experiences [2]. The results of this study show that it is desirable to mix theory and practice, as recommended by [12], to teach information security to students. The study thus offers a contribution for teachers in 206
5 planning course curricula to integrate theoretical and practical aspects of CNS. In the future, we would like to investigate CS students views on how authentication systems work and what must be done to ensure the security in these systems. how well computer security and usability go together. whose responsibility it is to make sure internet applications work in a secure way. ACKNOWLEDGMENT We thank the students who participated in the survey. How do you pay attention to wireless network security Why do you not pay attention to wireless network security Which applications can you think of that secure your communication from other people? What is(are) the first thing(s) that comes to your mind about securing a communication between two end-users? What kind of personal data would you like to keep private/secured from other people? What do you think are the implications of the disclosure of your personal data? REFERENCES [1] A. Anton, J. Earp, and J. Young. How internet users privacy concerns have evolved since Security Privacy, IEEE, 8(1):21 27, Jan-Feb [2] A. Berglund. Learning computer systems in a distributed project course : The what, why, how and where. PhD thesis, Uppsala University, Division of Computer Systems, [3] M. Bishop. Education in information security. Concurrency, IEEE, 8(4):4 8, Oct-Dec [4] S. Booth. On phenomenography, learning and teaching. Higher Education Research & Development, 16(2): , [5] S. Cooper, C. Nickell, L. C. Pérez, B. Oldfield, J. Brynielsson, A. G. Gökce, E. K. Hawthorne, K. J. Klee, A. Lawrence, and S. Wetzel. Towards information assurance (ia) curricular guidelines. In Proceedings of the 2010 ITiCSE working group reports, ITiCSE-WGR 10, pages 49 64, New York, NY, USA, ACM. [6] F. Marton. Phenomenography: Describing conceptions of the world around us. Instructional Science, 10: , [7] F. Marton and S. Booth. Learning and Awareness. Educational Psychology Series. Taylor & Francis, [8] K. Petrova, A. Philpott, P. Kaskenpalo, and J. Buchan. Embedding information security curricula in existing programmes. In Proceedings of the 1st annual conference on Information security curriculum development, InfoSecCD 04, pages 20 29, New York, NY, USA, ACM. [9] L. Svensson. Theoretical foundations of phenomenography. Higher Education Research & Development, 16(2): , [10] T. A. Yang. Computer security and impact on computer science education. J. Comput. Sci. Coll., 16(4): , Apr [11] A. Yasinsac. Information security curricula in computer science departments: Theory and practice. The George Washington University Journal of Information Security, 1(2): , [12] W. Yurcik and D. Doss. Different approaches in the teaching of information systems security. In Proceedings of the Information Systems Education Conference, APPENDIX We asked the following questions to the participants. Have you taken training in computer security before? How long did computer security training take? How would you evaluate the level of computer security training? How did computer security training affect your view and/or use of computer security? What is(are) the first thing(s) that comes to your mind about wireless network security? Do you pay attention to wireless network security when connecting to a wireless network? Why do you pay attention to wireless network security 207
Integrating learning technology into classrooms: The importance of teachers perceptions
Educational Technology & Society 5(1) 2002 ISSN 1436-4522 Integrating learning technology into classrooms: The importance of teachers perceptions Chris Cope Department of IT, La Trobe University PO Box
DESIGNING WEB LABS FOR TEACHING SECURITY CONCEPTS ABSTRACT
DESIGNING WEB LABS FOR TEACHING SECURITY CONCEPTS ABSTRACT Security education is critical in today s cyber threat environment. Many schools have investigated different approaches to teaching fundamental
9 th European Quality Assurance Forum
9 th European Quality Assurance Forum 13 15 November 2014 University of Barcelona, Spain Changing education QA and the shift from teaching to learning Author(s) Name: Inga Vau Position: Head of Academic
Cybersecurity Educational Standards
Cybersecurity Educational Standards Stephen Cooper, Stanford University Elizabeth Hawthorne, Union County College Lance C. Pérez, University of Nebraska - Lincoln Susanne Wetzel, Stevens Institute of Technology
Facilitating the discovery of free online content: the librarian perspective. June 2013. Open Access Author Survey March 2013 1
Facilitating the discovery of free online content: the librarian perspective June 2013 Open Access Author Survey March 2013 1 Acknowledgements This research was carried out on behalf of Taylor & Francis
Soft Skills Implementation in Construction Management Program: A Comparative Study of Lecturers and Students Perspective
Soft Skills Implementation in Construction Management Program: A Comparative Study of and Students Perspective H.Mohd Affandi, F. Hassan, Z. Ismail and M.F. Mustaffa Kamal Faculty of Architecture, Planning
Understanding Chinese Educational Leaders Conceptions of Learning and Leadership in an International Education Context
Understanding Chinese Educational Leaders Conceptions of Learning and Leadership in an International Education Context Ting Wang B.A. (Shanghai), M. Ed. Leadership (Canberra) A thesis submitted in fulfilment
Learning and Assessment of Nursing Unit Management Practice Using a Portfolio
Literacy Information and Computer Education Journal (LICEJ), Volume 5, Issue 3, September 2014 Learning and Assessment of Nursing Unit Management Practice Using a Portfolio Joyce D. Mokoena 1, Mokgadi
STUDENTS PERCEPTIONS OF ONLINE LEARNING AND INSTRUCTIONAL TOOLS: A QUALITATIVE STUDY OF UNDERGRADUATE STUDENTS USE OF ONLINE TOOLS
STUDENTS PERCEPTIONS OF ONLINE LEARNING AND INSTRUCTIONAL TOOLS: A QUALITATIVE STUDY OF UNDERGRADUATE STUDENTS USE OF ONLINE TOOLS Dr. David A. Armstrong Ed. D. D [email protected] ABSTRACT The purpose
Project 1 Report exemplar
Project 1 Report exemplar PART A: Understanding Student Learning Historically, scholarship in teaching has seen little or no attention in academic culture. An established track record in academic research
How To Train On Information Security
Stimulating Software Security Education at Community Colleges Through Training Workshops Akbar Siami Namin Computer Science Department Texas Tech University Lubbock, TX, USA [email protected] Fethi A.
Experiences from Direct Application of the PBL Method in Industrial Training and Organization Development
Experiences from Direct Application of the PBL Method in Industrial Training and Organization Development Bengt Lennartsson Department of Computer and Information Science Linköping S-581 83 LINKÖPING,
UX Research and Market Research
UX Research and Market Research A Conversation with Apala Lahiri Chavan Chief Oracle and Innovator Human Factors International The most important thing for user experience professionals to know is when
The Role of Information Technology Studies in Software Product Quality Improvement
The Role of Information Technology Studies in Software Product Quality Improvement RUDITE CEVERE, Dr.sc.comp., Professor Faculty of Information Technologies SANDRA SPROGE, Dr.sc.ing., Head of Department
Evaluation of degree programs. Self-Evaluation Framework
Evaluation of degree programs Self-Evaluation Framework COVER, December 2009 FOREWORD UNIL's approach to quality emphasizes procedures based on reflection that encourage the faculties and units concerned
REGULATIONS AND CURRICULUM FOR THE MASTER S PROGRAMME IN INFORMATION ARCHITECTURE FACULTY OF HUMANITIES AALBORG UNIVERSITY
REGULATIONS AND CURRICULUM FOR THE MASTER S PROGRAMME IN INFORMATION ARCHITECTURE FACULTY OF HUMANITIES AALBORG UNIVERSITY SEPTEMBER 2015 Indhold PART 1... 4 PRELIMINARY REGULATIONS... 4 Section 1 Legal
Email Encryption. Discovering Reasons Behind its Lack of Acceptance
Email Encryption Discovering Reasons Behind its Lack of Acceptance Kendal Stephens LaFleur Department of Computer Science Sam Houston State University Huntsville, TX, United States [email protected] Abstract
Key Factors for Developing a Successful E-commerce Website
IBIMA Publishing Communications of the IBIMA http://www.ibimapublishing.com/journals/cibima/cibima.html Vol. 2010 (2010), Article ID 763461, 9 pages Key Factors for Developing a Successful E-commerce Website
QUALITY ASSURANCE STRATEGY EUROPEAN HERITAGE DIGITAL MEDIA AND THE INFORMATION SOCIETY EUROPEAN MASTER PROGRAMME IN
Quality Assurance Strategy EuroMACHS 1 EUROPEAN MASTER PROGRAMME IN EUROPEAN HERITAGE DIGITAL MEDIA AND THE INFORMATION SOCIETY QUALITY ASSURANCE STRATEGY VERSION 1 Quality Assurance Strategy EuroMACHS
AN INITIAL COMPARISON OF EDUCATIONAL TECHNOLOGY COURSES FOR TRAINING TEACHERS AT MALAYSIAN UNIVERSITIES: A COMPARATIVE STUDY
AN INITIAL COMPARISON OF EDUCATIONAL TECHNOLOGY COURSES FOR TRAINING TEACHERS AT MALAYSIAN UNIVERSITIES: A COMPARATIVE STUDY Mona MASOOD Centre for Instructional Technology and Multimedia, Universiti Sains
Telecommunication (120 ЕCTS)
Study program Faculty Cycle Software Engineering and Telecommunication (120 ЕCTS) Contemporary Sciences and Technologies Postgraduate ECTS 120 Offered in Tetovo Description of the program This master study
C. Wohlin and B. Regnell, "Achieving Industrial Relevance in Software Engineering Education", Proceedings Conference on Software Engineering
C. Wohlin and B. Regnell, "Achieving Industrial Relevance in Software Engineering Education", Proceedings Conference on Software Engineering Education & Training, pp. 16-25, New Orleans, Lousiana, USA,
State University of New York at Canton Institutional Review Board. Sample Informed Consent Document
State University of New York at Canton Institutional Review Board Sample Informed Consent Document The following sample informed consent document includes instructions to the person writing the document,
Evaluation of Chicago Public Schools Virtual Pre-K Ready For Math Program That Integrates PBS KIDS Lab Digital Math Content
Evaluation of Chicago Public Schools Virtual Pre-K Ready For Math Program That Integrates PBS KIDS Lab Digital Math Content A Report to the CPB-PBS Ready To Learn Initiative Betsy McCarthy, PhD Donna Winston,
Security Education within the IT Curriculum
Security Education within the IT Curriculum Charles Border, Ph.D. Department of Information Technology Rochester Institute of Technology 102 Lomb Memorial Drive Rochester, NY 14623-5608 585-475-7946 [email protected]
Conditions of Studies Economics - Business Administration (B.A.) for the bachelor study programme of Business Administration (B.A.
Study Regulations* for the bachelor study programme of Business Administration (B.A.) at SRH Hochschule Berlin according to the decision of the senate 17 of the basic statutes 27. May 2010 1 * Whenever
Computer Engineering University of Tartu Faculty of Science and Engineering
Computer Engineering University of Tartu Faculty of Science and Engineering INTRODUCTION Program level: bachelor studies (ISCED-97 level 5A1) Nominal study period and credits: 3 years, 180 ECTS Degree
PISA FOR SCHOOLS. How is my school comparing internationally? Andreas Schleicher Director for Education and Skills OECD. Madrid, September 22 nd
PISA FOR SCHOOLS How is my school comparing internationally? Andreas Schleicher Director for Education and Skills OECD Madrid, September 22 nd PISA in brief Over half a million students representing 28
IBS Report Teaching Methods and resources
Document date: 2002-Nov-13 IBS Report Teaching Methods and resources 1 of 13 IBS Report Teaching Methods and resources IBS Valladolid International BEST Symposium in cooperation with ETNET 21 ETNET 21
INNOVATION IN UNDERGRADUATE COMPUTER SCIENCE EDUCATION
INNOVATION IN UNDERGRADUATE COMPUTER SCIENCE EDUCATION Amruth N. Kumar (Moderator) Ramapo College of New Jersey, Mahwah, NJ [email protected] Jack Beidler University of Scranton, PA [email protected]
Collecting & Analyzing Interview Data
Collecting & Analyzing Interview Data A. Collecting Interview Data A. Tape Recordings and Note Taking How the interviewer is to document the contents of the interaction with the respondent is a critically
Technology Use and Primary Music Education: Examining. Teacher Thinking And Practice
Technology Use and Primary Music Education: Examining Teacher Thinking And Practice Konstantinou Chrysovalentini, Pamela Burnard and Linda Hargreaves University of Cambridge Faculty of Education, Cambridge
Phase 1 pilot 2005/6 Intervention. GCU Caledonian Business School Business Management Page 1 of 8. Overview
University Department Module Overview Glasgow Caledonian Business school Business Management The Business School has been implementing assessment re-engineering using a variety of technologies, initially
A Survey of Online Tools Used in English-Thai and Thai-English Translation by Thai Students
69 A Survey of Online Tools Used in English-Thai and Thai-English Translation by Thai Students Sarathorn Munpru, Srinakharinwirot University, Thailand Pornpol Wuttikrikunlaya, Srinakharinwirot University,
Location, Location, Location: Challenges of Outsourced Usability Evaluation Murphy, John; Howard, Steve; Kjeldskov, Jesper; Goshnick, Steve
Aalborg Universitet Location, Location, Location: Challenges of Outsourced Usability Evaluation Murphy, John; Howard, Steve; Kjeldskov, Jesper; Goshnick, Steve Published in: Proceedings of the Workshop
Syllabus. Course: Becoming a Reflective Teacher Presenter: Dr. Robert J. Marzano Credits: 3
Syllabus Course: Becoming a Reflective Teacher Presenter: Dr. Robert J. Marzano Credits: 3 Required ebook: Becoming a Reflective Teacher (Robert Marzano with Tina Boogren, Tammy Heflebower, Jessica McIntyre,
Context-Aware Role Based Access Control Using User Relationship
International Journal of Computer Theory and Engineering, Vol. 5, No. 3, June 2013 Context-Aware Role Based Access Control Using User Relationship Kangsoo Jung and Seog Park We suggest relationship-based
Cisco IOS Public-Key Infrastructure: Deployment Benefits and Features
Data Sheet Cisco IOS Public-Key Infrastructure: Deployment Benefits and Features Introduction to Public Key Infrastructure Public Key Infrastructure (PKI) offers a scalable method of securing networks,
Measuring the response of students to assessment: the Assessment Experience Questionnaire
11 th Improving Student Learning Symposium, 2003 Measuring the response of students to assessment: the Assessment Experience Questionnaire Graham Gibbs and Claire Simpson, Open University Abstract A review
2013 Review of the MS in Sport Management
KNPE/M.S. Sport Management Assessment 1 2013 Review of the MS in Sport Management PROGRAM DESCRIPTION The Master of Science in Sport Management degree is designed to prepare students for a management career
Report on Game Design and Development Courses Meeting Knowledge Areas
Report on Game Design and Development Courses Meeting Knowledge Areas Brent M. Dingle Summer 2014 Revised Fall 2014 and Spring 2015 Abstract This document approaches a Game Design and Development (GDD)
Doctoral Nursing Education in South Korea
Doctoral Nursing Education in South Korea Hyeoun-Ae Park, RN, PhD, FAAN*, Ok Soo Kim, RN, PhD**, Myung Kyung Lee, RN, PhD*** Introduction History of nursing education in Korea goes back to 1903 when Bogu
Characteristics of Effective and Sustainable Teaching Development Programs for Quality Teaching in Higher Education
Characteristics of Effective and Sustainable Teaching Development Programs for Quality Teaching in Higher Education This presentation will address the following conference aim/question: What are the contextual
A Categorization of Novice Programmers: A Cluster Analysis Study
A Categorization of Novice Programmers: A Cluster Analysis Study Essi Lahtinen Tampere University of Technology Institute of Software Systems Tampere, Finland [email protected] Abstract. Beginning software
CSCD 330 Network Programming Winter 2015. Lecture 1 - Course Details
CSCD 330 Network Programming Winter 2015 Lecture 1 - Course Details Contact Information Instructor: Carol Taylor 319A CEB Phone: 509-359-6065 E-mail: [email protected] Course: CSCD330, CEB 204 Lecture,
General Syllabus for Research Studies in
ÖREBRO UNIVERSITY General Syllabus for Research Studies in SPORT SCIENCE Idrottsvetenskap This syllabus was approved by the Faculty Board of Medicine and Health on 3 February 2012 (reg. no. CF 62-69/2012)
Factors Influencing the Adoption of Biometric Authentication in Mobile Government Security
Factors Influencing the Adoption of Biometric Authentication in Mobile Government Security Thamer Omar Alhussain Bachelor of Computing, Master of ICT School of Information and Communication Technology
LOUGHBOROUGH UNIVERSITY
LOUGHBOROUGH UNIVERSITY Programme Specification Computer Science Please note: This specification provides a concise summary of the main features of the programme and the learning outcomes that a typical
Design of an Interface for Technology Supported Collaborative Learning the RAFT Approach
Design of an Interface for Technology Supported Collaborative Learning the RAFT Approach Lucia Terrenghi 1, Marcus Specht 1, Moritz Stefaner 2 1 Fraunhofer FIT, Institute for Applied Information Technology,
Policy on Surveying and Responding to Student Opinion
Policy on Surveying and Responding to Student Opinion Purpose and Scope 1. Newcastle University is committed to ensuring that students receive the highest quality experience whilst studying here. As students
STORRE: Stirling Online Research Repository Policy for etheses
STORRE: Stirling Online Research Repository Policy for etheses Contents Content and Collection Policies Definition of Repository Structure Content Guidelines Submission Process Copyright and Licenses Metadata
The University of Adelaide Business School
The University of Adelaide Business School MBA Projects Introduction There are TWO types of project which may be undertaken by an individual student OR a team of up to 5 students. This outline presents
George Hack, PhD. [email protected] Cell: 352-256-4785. 9007 SW 132 Street Archer, Florida 32618 EDUCATION
George Hack, PhD 9007 SW 132 Street Archer, Florida 32618 [email protected] Cell: 352-256-4785 EDUCATION Doctor of Philosophy: (Summer 2004), Gainesville, Florida Focus: Educational Technology/Instructional
UGC(Minimum Standards of Instruction for the Grant of the Master's Degree through Formal Education)Regulations, 2003.
UNIVERSITY GRANTS COMMISSION BAHADUR SHAH ZAFAR MARG NEW DELHI UGC(Minimum Standards of Instruction for the Grant of the Master's Degree through Formal Education)Regulations, 2003. (In supersession of
Modeling Customer Behavior in Multichannel Service Distribution: A Rational Approach D. Heinhuis
Modeling Customer Behavior in Multichannel Service Distribution: A Rational Approach D. Heinhuis Appendix 4 Summary Research question Most organizations have innovated their distribution strategy and adopted
CALCULUS COURSES AT THE COMPUTER SCIENCE FACULTY, THE UNIVERSITY OF INDONESIA
CALCULUS COURSES AT THE COMPUTER SCIENCE FACULTY, THE UNIVERSITY OF INDONESIA Kasiyah MACHMUDIN Department of Mathematics, University of Indonesia Computer Science Faculty, University of Indonesia [email protected]
THE TEACHING COUNCIL [REGISTRATION] REGULATIONS IN ACCORDANCE WITH SECTION 31 OF PART 3 OF THE TEACHING COUNCIL ACTS, 2001 TO 2006 ( THE ACT )
THE TEACHING COUNCIL [REGISTRATION] REGULATIONS IN ACCORDANCE WITH SECTION 31 OF PART 3 OF THE TEACHING COUNCIL ACTS, 2001 TO 2006 ( THE ACT ) The Teaching Council in exercise of the powers conferred on
AVIATION MANAGEMENT MASTER AND DOCTORATE PROGRAMMES IN ANADOLU UNIVERSITY: ACADEMIC STAFF NECESSITIES OF AVIATION FACULTIES IN TURKEY
AVIATION MANAGEMENT MASTER AND DOCTORATE PROGRAMMES IN ANADOLU UNIVERSITY: ACADEMIC STAFF NECESSITIES OF AVIATION FACULTIES IN TURKEY ABSTRACT: Dr. UNAL BATTAL [email protected] ANADOLU UNIVERSITY
Exploring the directions and methods of business development. A comparative multiple-case study on Ikea and Vodafone
Exploring the directions and methods of business development A comparative multiple-case study on Ikea and Vodafone Michal Štefan Aalborg University Master thesis for MSc. in International Business Economics
A Survey of Best Practice in Computer Science Teaching
A Survey of Best Practice in Computer Science Teaching Peter Strazdins, Department of Computer Science, College of Engineering and Computer Science, The Australian National University DCS Seminar Series,
Methods Commission CLUB DE LA SECURITE DE L INFORMATION FRANÇAIS. 30, rue Pierre Semard, 75009 PARIS
MEHARI 2007 Overview Methods Commission Mehari is a trademark registered by the Clusif CLUB DE LA SECURITE DE L INFORMATION FRANÇAIS 30, rue Pierre Semard, 75009 PARIS Tél.: +33 153 25 08 80 - Fax: +33
Survey Results and Further Issues in Construction Automation Education
327 Survey Results and Further Issues in Construction Automation Education Dr. R. Navon Lecturer, Faculty of Civil Engineering Senior Research Engineer, National Building Research Institute Technion -
How Accelerated Nursing Students Learn
How Accelerated Nursing Students Learn A Comparative Case Study of the Facilitators, Barriers, Learning Strategies, Challenges and Obstacles of students in an Accelerated Nursing Program Background and
Teaching Requirements through Interdisciplinary Projects
Teaching Requirements through Interdisciplinary Projects Deepti Suri, Eric Durant Department of Electrical Engineering and Computer Science Milwaukee School of Engineering 1025 North Broadway Milwaukee,
N/A. Computing, Engineering
UNIVERSITY OF BRADFORD School of Engineering and Informatics School of Electrical Engineering and Computer Science Programme title: BEng (Hons) Software Engineering Awarding institution: Teaching institution:
Qualitative data acquisition methods (e.g. Interviews and observations) -.
Qualitative data acquisition methods (e.g. Interviews and observations) -. Qualitative data acquisition methods (e.g. Interviews and observations) ( version 0.9, 1/4/05 ) Code: data-quali Daniel K. Schneider,
A New MSc Curriculum in Computer Science and Mathematics at the University of Zagreb
A New MSc Curriculum in Computer Science and Mathematics at the University of Zagreb Robert Manger, Goranka Nogo, Mladen Vuković Department of Mathematics, University of Zagreb Bijenička cesta 30, 10000
M.A. EDUCATION M.A. DEVELOPMENT M.A. PUBLIC POLICY AND GOVERNANCE Specialisations in. Specialisations in
About Us, Our Vision and Mission Azim Premji University was established by the Azim Premji Foundation, in 2010. The Foundation s vision is to contribute to the realization of a just, equitable, humane
The impact of training of university teachers on their teaching skills, their approach to teaching and the approach to learning of their students
The impact of training of university teachers on their teaching skills, their approach to teaching and the approach to learning of their students active learning in higher education Copyright 2004 The
USING NVIVO FOR DATA ANALYSIS IN QUALITATIVE RESEARCH AlYahmady Hamed Hilal Saleh Said Alabri Ministry of Education, Sultanate of Oman
USING NVIVO FOR DATA ANALYSIS IN QUALITATIVE RESEARCH AlYahmady Hamed Hilal Saleh Said Alabri Ministry of Education, Sultanate of Oman ABSTRACT _ Qualitative data is characterized by its subjectivity,
Evaluation of an Applied Psychology Online Degree Maggie Gale, University of Derby
Evaluation of an Applied Psychology Online Degree Maggie Gale, University of Derby Summary An online questionnaire survey was used to explore the learning experiences of 29 students studying for a unique
Abstraction in Computer Science & Software Engineering: A Pedagogical Perspective
Orit Hazzan's Column Abstraction in Computer Science & Software Engineering: A Pedagogical Perspective This column is coauthored with Jeff Kramer, Department of Computing, Imperial College, London ABSTRACT
Psychology / Sociology 4120H-A: Qualitative Research & Analysis 2012 FALL - Oshawa
DEPARTMENTS OF PSYCHOLOGY & SOCIOLOGY TRENT UNIVERSITY Psychology / Sociology 4120H-A: Qualitative Research & Analysis 2012 FALL - Oshawa INSTRUCTOR Rory Coughlan, Ph.D. Health & Life Sciences Building
Exploring students experience of project-based learning in an instructional design course
Exploring students experience of project-based learning in an instructional design course Ioana Hartescu Lancaster University, UK [email protected] Abstract. The present research aims to explore the
ACADEMIC AWARD REGULATIONS Regulations for the Award of the Doctor of Philosophy on the Basis of Published Work
ACADEMIC AWARD REGULATIONS Regulations for the Award of the Doctor of Philosophy on the Basis of Published Work Name of regulation : Purpose of regulation : Approval for this regulation given by : Responsibility
Network Security: A Case Study
Network Security: A Case Study Susan J. Lincke Computer Science Department University of Wisconsin-Parkside Kenosha, WI [email protected] Abstract This paper reviews 3 case studies related to network security.
Assessment Planning Guide for University of Rochester Graduate Degree Programs
Assessment Planning Guide for University of Rochester Graduate Degree Programs I. Introduction II. Useful outcomes-based program assessment: Designing an assessment plan that addresses key questions and
Appendix B Data Quality Dimensions
Appendix B Data Quality Dimensions Purpose Dimensions of data quality are fundamental to understanding how to improve data. This appendix summarizes, in chronological order of publication, three foundational
2010-2011 Assessment for Master s Degree Program Fall 2010 - Spring 2011 Computer Science Dept. Texas A&M University - Commerce
2010-2011 Assessment for Master s Degree Program Fall 2010 - Spring 2011 Computer Science Dept. Texas A&M University - Commerce Program Objective #1 (PO1):Students will be able to demonstrate a broad knowledge
The value of accredited certification
Certified Once Accepted Everywhere The value of accredited certification Survey Report Published May 212 In 21/11, the IAF carried out a global survey to capture market feedback on the value of certification.
Considering the Cultural Issues of Web Design in Implementing Web-Based E-Commerce for International Customers
Considering the Cultural Issues of Web Design in Implementing Web-Based E-Commerce for International Customers Kyeong. S. Kang The First International Conference on Electronic Business, Faculty of Information
Process of Strategic Marketing Decision Making in Small Business. Graham Jocumsen and Michael Gardiner, University of Southern Queensland.
Process of Strategic Marketing Decision Making in Small Business Graham Jocumsen and Michael Gardiner, University of Southern Queensland Abstract The current inadequate level of understanding of how small
