Warning: Illegal string offset 'type' in /home/sigite/public_html/sigite2012/wp-content/themes/evento/lib/php/extra.class.php on line 32

Warning: Illegal string offset 'type' in /home/sigite/public_html/sigite2012/wp-content/themes/evento/lib/php/extra.class.php on line 32
SIGITE/RIIT 2012 » ACM Conference on IT Education/Research » Paper Review Guide

Paper Review Guide

  • General Recommendations

    Here are some recommendations for writing reviews of submitted papers that help the authors and improve the quality of the symposium.

    • Education – Experience Reports describe an idea, course or classroom experience that worked well and is now recommended to others.
    • Education – Research Studies present a careful study, with an appropriate use of methodology (e.g., case study, qualitative methods, quasi-experimental, experimental) to support the investigation and stated results. The methodology does not need to be quantitative; it does, however, need to be appropriate to support the claims made by the author.
    • Education – Philosophical Papers present an argument for a direction or idea to be considered in our curriculum, a particular course, or the overall field.
    • Education – Tool Papers present courseware or a concrete process that has been developed and is now ready for wider use.
    • IT Research Papers covers the full spectrum of research-level projects within the IT field

    While each type of paper is evaluated on organization, technical soundness, potential contribution and overall evaluation, you may be looking for different things in these categories depending on the category of the paper. You do not need to require an experience report to be a research study, nor a research study to provide a tool. All papers should show appropriate organization and should reflect the literature that already exists related to the topic being discussed. All claims should be supported by logical arguments that follow from ideas, experience or data provided.

    Some other general points to remember as a reviewer:

    • Your job as a reviewer is to write detailed reviews, even for excellent papers. In addition to telling the authors what you didn’t like about their paper, be sure to include what you did like as well.
    • Even if your opinion is that the paper is poorly written or poorly thought-out, you can still provide constructive criticisms to help the authors, and in the long run, the conference. Think of your goal as convincing the authors of the paper you’re reviewing to submit something else next year, but of such high quality that it will be well-reviewed and easily accepted. Give the authors advice on how to do that.
    • The best reviews clearly justify the reviewer’s choice of rating. The least valuable review gives a low score with no written comments. That simply tells the authors that they have been unsuccessful, with no indication of how or why.
    • The focus of your review should be on content.
    • Papers that you review are supposed to be anonymous. Your review should be based on the merits of the paper, not the reputation of the authors or their institutions. Therefore, we have asked the authors to remove all identifiable references to themselves. We realize that reviewers sometimes know the work and can guess who the authors of the papers might be.
    • If you recognize the work, it is your responsibility to give a fair and unbiased review, using only the information in the paper. If you do not feel that you can give a fair, unbiased review of the paper and not the authors or institutions, please contact the program chairs immediately.
    • Your review should not include comments to the authors about the anonymization (or lack thereof) in the paper. If you feel that it is necessary to comment on this, please use the text box, ‘Confidential comments to the committee.’
    • We realize that occasionally anonymization requires the authors to remove information that affects your review (information that otherwise the paper appears to lack). As a reviewer, you can give the authors the benefit of the doubt. Use the ‘Confidential comments to the committee’ box to indicate this to us. Example “This paper should reference Mark Guzdial’s work, unless those references were removed for anonymity”).
    • Please point out typographic and grammatical errors; if there are too many to list, please state so in your review.
    • Although SIGITE requires all submitted papers to be polished work, all accepted authors get a brief opportunity to improve the presentation of their paper before camera-ready copy is due. Your detailed feedback may help improve a paper, and in a small way, improve the conference.

    Substandard Recommendations

    SIGITE 2012 will use a meta-review process after reviews have been submitted. Reviews that do not objectively, accurately, and clearly assess a paper’s suitability for publication at SIGITE, founded in the reviewer’s disciplinary expertise and on the basis of the written paper’s originality, technical soundness, contribution to IT education, and clarity of presentation, may be deleted.

    For example, an unacceptable review might:

    • be incoherent, unreadable, or irrelevant to the paper;
    • focus on the paper’s topic area or presumed authors at the expense of assessing the paper itself; or
    • provide no justification for its numeric ratings. (Even in “obvious” cases, reviewers should briefly justify ratings.)

    Please note that a difference in rating or opinion with other reviewers or program committee members will NEVER be cause for deletion of a review.

    Examples of Good Reviews

    To help reviewers better understand the qualities of good, useful reviews, here are several example comments, organized by review category:

    • The paper presentation (organization and writing style)
      • The organization of the units on forensics was well done. However, the discussion of how it fits into the curriculum is overly broad and not too realistic. Many factors were overlooked on the “curriculum side”.
      • Good level of detail on your approach. Table 2 is very handy. Under Section 2, it seems like log analysis and auditing may fit in your column two. How will you ensure additional security emphasis is implemented?
      • The paper was easy to read, although it could benefit from a review of the English sentence structure. The paper was organized in an easy-to-follow manner. The authors explained their motivations and methods for their study.
      • The paper could use additional proofing and polishing. I suggest finding a non-robotics person to read for both language and communication. Some sentences are poorly formed (e.g., sent. 1 of last par. in sec. 1). Some content seems misplaced (e.g., discussion of mobility in section 3).
      • The organization is faultless. It is very clear what the paper is going to say and how. The paper follows through with crystal clear subject headings and a logical flow of information. There are some grammatical problems; these are not serious, but a thorough proof-reading would be helpful.
    • The idea or work presented is original and appropriately builds on and acknowledges previous work in the area
      • I would have liked to see some discussion and references setting this work in the context of other studies of student learning and knowledge retention. While I don’t know of other studies that have examined exactly the phenomenon this paper does, a short search in the ACM digital library turned up these examples that are relevant…
    • The paper is technically sound; it includes evidence for any statements or conclusions that it makes
      • This paper makes a very good argument in the introduction for why this course is needed. It is timely, and addresses a topic outside of the norm often seen at SIGITE.
      • I can’t recall ever seeing something similar at SIGITE. In spite of the previous problems, I would urge acceptance of this paper on a topic that we rarely see at SIGITE.
      • The hypotheses are too obvious and the validation of them is not enough. Therefore, the contribution of this paper is quite limited.
    • The idea or work presented has potential to contribute to CS education
      • This paper should generate a lot of discussion and have a good audience. It is a topic that many schools are trying to address (including mine.)
      • Hard to judge given the writing organization problems, but I do not see a lot of significance here. The verification that the laboratory helped more than on-line component alone is a nice result, if it is supported by the data. Having taught this course already and collected feedback on your approach makes the paper stronger.
      • It is important for those who might be considering this approach to know that it can be successful. If I were considering this approach I would want to know if the students could understand the code, and how deeply I could get into the material given time constraints.
    • Overall evaluation
      • As noted above, I’d urge acceptance of this paper because it’s relevant and unique. If it had competitors, I wouldn’t be nearly so kind. But I haven’t seen competitors.
      • This is a good, interesting topic, accessible to the SIGITE audience, and widely useful.
      • A good practical beginning guide to implementing lab exercises in a visualization course.
      • Given the potential interest in this topic the authors could do better to capture the imagination of the reader; perhaps with a paragraph or two on famous cases.
    • Presentation
      • The material stands well on its own but could be made more attractive for a presentation. Help the audience understand why this is interesting. Relate some “exciting horror stories” of real-world failures. Justify why a full semester should be devoted to this course in an already tightly-packed curriculum.
      • After introducing the course, spend time on how you handle the diverse population. Also spend time on the lab components that the students found most interesting. Provide handouts of the lab exercises for those who are interested (or provide a link to a web resource.)


    If you have questions about paper submissions, please contact SIGITE 2012 / RIIT-2012 Program Chairs:
    Dave Armitage (SIGITE-2012)
    Abdel Ejnioui (SIGITE-2012)
    Jeff Brewer (RIIT-2012)

  • Conference Registration


    SIGITE/RIIT 2012

    Canada , Calgary, Alberta·October 10 - 13, 2012

    Registration Details
    $310 ACM Members Early (Ends Aug 31)
    $320 Non-Members Early (Ends Aug 31)
    $340 ACM Members (After Aug 31)
    $370 Non-Members (After Aug 31)
    $50 Student

    register for the event 

  • Hotel Bookings


    The SIGITE 2012 conference itself be held in the Hotel Arts, which is a 175-room, full-service boutique hotel in the exciting heart of Calgary.

    Hotel Arts
    119 - 12th Avenue SW
    Calgary, AB T2R 0G8
    Phone: 403.266.4611
    Fax: 403.237.0978
    Toll-free: 1.800.661.9378
    Email: info@hotelarts.ca
    Bookings: reservations@hotelarts.ca

    Mention SIGITE 2012 or ACM or Association of Computing Machinery to get the special room rate.