Warning: Illegal string offset 'type' in /home/sigite/public_html/sigite2012/wp-content/themes/evento/lib/php/extra.class.php on line 32

Warning: Illegal string offset 'type' in /home/sigite/public_html/sigite2012/wp-content/themes/evento/lib/php/extra.class.php on line 32
SIGITE/RIIT 2012 » ACM Conference on IT Education/Research » Presentations

Presentations

    • exhibitor - Planning Organizational Security: The Health First Case Study
      Planning Organizational Security: The Health First Case Study Security is important skill for an IT professional, and allows him/her to advance and specialize in their career. We developed an Information Security course with a goal of training students for the ISACA CISA and CISM exams, and having students participate in security planning with not-for-profit organizations. ...

      Continue reading 

    • exhibitor - Designing a Masters Program in Cyber Security and Leadership
      Designing a Masters Program in Cyber Security and Leadership This paper discusses the design process and possible ways to reduce risk in the start-up of a new degree program. How a program is marketed to prospective students and what program graduates will do after program completion is just as important as the initial design of the program. Planning for the administration of the program and the assessment process is an important phase of the initial design.

      Continue reading 

    • exhibitor - Game-based Forensics Course For First Year Students
      Game-based Forensics Course For First Year Students This paper focuses on the design and development of a gamebased forensics course using the game-based learning (GBL) approach building the game in a real computing environment that has direct access to actual forensics tools from a forensics machine and the evidence from a suspect machine. ...

      Continue reading 

    • exhibitor - Influence of Proximity To and Accessibility of School On School Choice of Information Technology Students
      Influence of Proximity To and Accessibility of School On School Choice of Information Technology Students The study determined the profile, level of school choice, and influence of proximity to and accessibility of school on the level of school choice of Information Technology (IT) students. ...

      Continue reading 

    • exhibitor - Comparing Achievement of Intended Learning Outcomes in Online Programming Classes with Blended Offerings
      Comparing Achievement of Intended Learning Outcomes in Online Programming Classes with Blended Offerings In the past decade, there has been a noticeable increase in the number of courses/programs offered online by higher education institutions in US and worldwide. This research discusses findings of a multiyear, in-depth quantitative study with the objective of assessing the effectiveness of delivering computer programming courses online and analyzing the quality of this delivery mechanism. The paper addresses several aspects of comparing tradition/blended offerings with fully online offerings.

      Continue reading 

    • exhibitor - Learning by Design: Making the Case for a Teaching Strategy to Teach Information Systems Courses
      Learning by Design: Making the Case for a Teaching Strategy to Teach Information Systems Courses Teaching Information Systems in the undergraduate level requires certain skills to integrate theory with practice. One of the most effective teaching pedagogies is “Learning by Design” in which learners are fully engaged in the construction and the execution of the course activities. ...

      Continue reading 

    • exhibitor - Developing and Improving Interdisciplinary Health Information Technology Certificate Programs
      Developing and Improving Interdisciplinary Health Information Technology Certificate Programs The paper summarizes our experience in the HIT curriculum development and student feedback. Future improvement for the programs is also discussed. ...

      Continue reading 

    • exhibitor - Analysis and Extraction of Sentence-Level Paraphrase Sub-Corpus in CS Education
      Analysis and Extraction of Sentence-Level Paraphrase Sub-Corpus in CS Education Since the advent of the Internet, plagiarism has become a widespread problem in student submissions. In this work, we construct a sub-corpus of paraphrased sentences by extracting all lightly and heavily revised sentences from the Corpus of Plagiarized Short Answers, using modified criteria for sentences. Our findings suggest that this sub-corpus is more suited for testing paraphrase detection techniques by providing sentence-level paraphrasing samples instead of the file-level classification provided in the original corpus. ...

      Continue reading 

    • exhibitor - A Holistic and Pragmatic Approach to Teaching Web Accessibility in an Undergraduate Web Design Course
      A Holistic and Pragmatic Approach to Teaching Web Accessibility in an Undergraduate Web Design Course Web accessibility is a fundamental instrument to support the shift towards an inclusive cyberspace and a socially responsible society, and higher education plays an essential role in this effort. This paper fills the gap of lacking literature by reporting an undergraduate Web design course that adopts a holistic and pragmatic approach to teaching Web accessibility and presenting the specific accessibility topics and techniques that are appropriate for the course scope and its assessment strategies.

      Continue reading 

    • exhibitor - Introducing Mobile Widgets Development in an Advanced Web Technologies Course
      Introducing Mobile Widgets Development in an Advanced Web Technologies Course Mobile Widgets are mobile applications built using standard web technologies. Due to their increasing popularity and the potential they hold as the new frontier of mobile applications development, IT students need to have the essential knowledge to develop and deploy mobile widgets. To address this demand in knowledge, this paper presents our experience in improving the curriculum of an advanced web technologies course to incorporate a portion about mobile widgets development.

      Continue reading 

    • exhibitor - Metonymic Errors in a Web Development Course
      Metonymic Errors in a Web Development Course This paper investigates a class of database access errors that occur in the context of a web development course. While the use of an Object-Relational Mapping (ORM) simplifies database access, students still demonstrate reference errors such as mistakenly referring to the whole object rather than an attribute value that is a part of the object. Metonymy, a rhetorical device used in human communication, offers an interpretation to these errors....

      Continue reading 

    • exhibitor - Risks, Rewards and Raising Awareness: Training a Cyber Workforce Using Student Red Teams
      Risks, Rewards and Raising Awareness: Training a Cyber Workforce Using Student Red Teams In this paper we discuss how a research-orientated student redteam provides free security assessments to organizations within the community. Such activities provide students with valuable skills and knowledge in dealing with real-world security issues. We present our approach to implementing such a team as a permanent fixture within our IT program’s Cyber Security Research Lab and discuss the mutual benefits that such an offering presents.

      Continue reading 

    • exhibitor - Evaluations of AODV and DSR for QoS Requirements
      Evaluations of AODV and DSR for QoS Requirements A set of wireless mobile nodes communicate with each other without using any fixed infrastructure in mobile ad hoc network (MANET). MANET devices usually communicate in a seamless manner. There are multiple routing protocols that have been developed for MANETs. There is a need to support VoIP applications in MANETs as they gain popularity and require an efficient routing protocol. This work evaluates the performance of AODV and DSR by comparing the results while supporting VoIP applications with regular HTTP and FTP applications. ...

      Continue reading 

    • exhibitor - Mapping the Cyber Security Terrain in a Research Context
      Mapping the Cyber Security Terrain in a Research Context In this paper we present a mapping of cyber-security research to information technology as a technical research discipline. We first discuss the evolution of IT as an academic discipline and use this to establish technical research objectives in an IT context. We then present our definition of cyber-security and a proposed research agenda based on these objectives and conclude with a discussion of current projects within our institution.

      Continue reading 

    • exhibitor - Discovering Workplace Motivators for the Millennial Generation of IT Employees
      Discovering Workplace Motivators for the Millennial Generation of IT Employees This paper provides an overview on motivational research and describes the research methodology and approach that was used to identify the workplace rewards and motivators that the youngest generation of employees, the millennial generation or generation Y, finds attractive in organizations looking to hire them for fulltime Information Technology (IT) positions. Preliminary findings from a pilot study conducted at Purdue University are shared.

      Continue reading 

    • exhibitor - Identifying and Evaluating Information Technology Bachelor’s Degree Programs
      Identifying and Evaluating Information Technology Bachelor’s Degree Programs This paper describes the process for identifying and evaluating Information Technology (IT) bachelor’s programs in the United States, in an effort to answer the question, how many IT bachelor’s programs are there in the US? Due to widespread variation in the names of academic degree programs, one cannot simply count those named Information Technology. ...

      Continue reading 

    • exhibitor - Resource Utilization Prediction: A Proposal for Information Technology Research
      Resource Utilization Prediction: A Proposal for Information Technology Research Research into predicting long-term resource needs has been faced with a very difficult problem of extending the accuracy period beyond the immediate future. Business forecasting has overcome this limitation by successfully incorporating the concept of human interaction as the basis of prediction patterns at the hourly, daily, weekly, monthly, and yearly time frames. ...

      Continue reading 

    • exhibitor - Partnering with Industry to Deliver a Senior Level Course in the  Bachelor of Computer Information Systems Degree Program
      Partnering with Industry to Deliver a Senior Level Course in the Bachelor of Computer Information Systems Degree Program The senior level course titled Information Systems Organization in the Bachelor of Computer Information System Program at Mount Royal University was designed to have an industry based project component. This paper describes the implementation of this project as well as the comments and perspectives of the instructor, the industry partners, and the students. The students’ perspective is written by the co-author who took this course last winter.

      Continue reading 

    • exhibitor - IT Service Management Education in Tanzania: An Organizational and Grassroots-Level Perspective
      IT Service Management Education in Tanzania: An Organizational and Grassroots-Level Perspective Technology transfer from developed countries to developing ones is not a straightforward process. This is due to the expertise required for utilizing technology. ... Development of IT students’ expertise requires adequate ICT facilities, but the effects of organizational support, human capacity, and the relevance of curriculum to the local context are crucial factors in IT service management education. This paper is based on fourteen years of experience in a Tanzanian university, and it shows the importance of the topics above for IT education in general.

      Continue reading 

    • exhibitor - Multi-perspective Survey of the Relevance of the Revised Bloom’s Taxonomy to an Introduction to Linux Course
      Multi-perspective Survey of the Relevance of the Revised Bloom’s Taxonomy to an Introduction to Linux Course Equipping students with higher-order thinking skills as part of a program in information technology is no trivial aim. Course creation must always have this goal in mind. In particular, learning activities and assessments must be designed to teach, encourage the use of, and assess success in achieving this goal, beyond merely teaching facts, methods and techniques. In this paper, we examine the degree to which we were able to assess higher-order thinking skills in students enrolled in the first course of an online Linux system administration curriculum. ...

      Continue reading 

    • exhibitor - Panel: Capstone Experiences for Information Technology
      Panel: Capstone Experiences for Information Technology The goal of this panel is to discuss best practices for capstone experiences for BSIT degree programs. The panel will contrast varied implementations of IT integrative capstone experiences to provide a starting point for discussion. Each panelist will briefly describe their institution’s capstone experience, discuss the benefits and drawbacks to their implementation, share issues and ideas they have for improving the capstone, and discuss student opinions of the capstone. A minimum of 35 minutes will be set aside for audience interactions.

      Continue reading 

    • exhibitor - Panel: Best Practices in Teaching Information Technology  Development
      Panel: Best Practices in Teaching Information Technology Development Programming is one of the most fundamental and central topics in the information technology curriculum. Because of its importance it is crucial to understand how to effectively teach development students. In this panel we share best practices for teaching programming to a variety of populations, including freshman, non-majors, and community college students. Various pedagogical approaches including pair programming, studiobased instruction, peer instruction, active learning, cooperative learning, project-based pedagogy, high-impact education practices, and CS Unplugged type activities are included.

      Continue reading 

    • exhibitor - Testing and Quantifying ERP Usability
      Testing and Quantifying ERP Usability Enterprise Resource Planning (ERP) systems benefit businesses while the typically complex interface can challenge end users. Many prior studies of ERP users measure attitudes rather than actual use of the ERP. This research involved testing users as they worked with PeopleSoft™ to complete an inventory procedure. ...

      Continue reading 

    • exhibitor - A Simulation-Based Fuzzy Multiplet Attribute Decision Making for Prioritizing Software Requirements
      A Simulation-Based Fuzzy Multiplet Attribute Decision Making for Prioritizing Software Requirements It is well known that most of the approaches proposed in recent research to prioritize software requirements have not been widely adopted. These approaches are too complex and time consuming, or inconsistent and difficult to implement. This paper proposes a new approach to prioritize requirements that is practical and easily implementable. Whereas most proposed approaches quantify requirements in precise and crisp parameters, this paper takes in consideration the imprecise nature of requirements by modeling their attributes as fuzzy variables.

      Continue reading 

    • exhibitor - Comparison of VM deployment methods for HPC education
      Comparison of VM deployment methods for HPC education Operating System virtualization has seen major adoption across many industry elds, this growth has driven penetration into more traditional settings such as high performance computing and cluster systems. Developing an effective and efficient teaching environment for virtual high performance computing systems is complicated by a wide range of virtualization systems (open source and commercial), a variety of hardware platforms, and many different storage approaches for storing and distributing virtual machine images. ...

      Continue reading 

    • exhibitor - MOBILE: A MOBile Instructional Laboratory Environment for Hands-on Information Technology Education
      MOBILE: A MOBile Instructional Laboratory Environment for Hands-on Information Technology Education We present MOBILE, a software system providing ad-hoc and hands-on learning environments for information technology education. Using MOBILE, instructors can hold workshops on any available computers, even in restricted lab settings or using participant computers. Features supported by this software include the ability to build and configure a workshop session on any desired information technology topic, creation and management of that session on top of any existing network, distribution and configuration of additional operating systems and applications, and the inclusion of auxiliary content relevant to the session. ...

      Continue reading 

    • exhibitor - Use of a Mobile Application to Promote Scientific Discovery Learning: Students’ Perceptions towards and Practical Adoption of a Mobile Application
      Use of a Mobile Application to Promote Scientific Discovery Learning: Students’ Perceptions towards and Practical Adoption of a Mobile Application This paper examines what students think about the use of a mobile application as a learning support tool and describes how a mobile application helps students improve scientific discovery learning outside of school. To meet the needs of conveniently saving and retrieving student’s learning, the customized mobile application eBookMaker was developed for our two studies. This application enables students to quickly create mobile documents offering media-rich functionalities. ...

      Continue reading 

    • exhibitor - Identifying Measures to Cultivate Teachers’ Competence for Teaching through Personal Learning Environment Conception: A Delphi Study
      Identifying Measures to Cultivate Teachers’ Competence for Teaching through Personal Learning Environment Conception: A Delphi Study Personal learning environment (PLE) is a learner centered and controlled environment where learner constructs his knowledge socially and collaboratively with the help of knowledgeable peers, mentors, and teachers. Teacher, being the most knowledgeable stakeholder in this environment, has to develop a strong and multifunctional association between the two: the learner and the PLE. However, in real world scenarios, this is not the case as teachers’ current competencies are not sufficiently developed to provide desired results. ...

      Continue reading 

    • exhibitor - Turning the Tables: Learning from Students about Teaching CS1
      Turning the Tables: Learning from Students about Teaching CS1 Programming has a central role in the computing curriculum, and introductory programming classes have been extensively studied in the computer science education literature. However, most of the studies focus on the effectiveness of various pedagogical approaches on student learning and engagement, and relative little attention is paid to faculty development. The gap in the literature puts CS1 faculty interested in effectively implementing innovative pedagogical approaches in a difficult situation. This article argues that taking a behaviorist approach to the CS1 classroom can provide much-needed feedback. ...

      Continue reading 

    • exhibitor - Engaging Undergraduate Programming Students: Experiences using Lego Mindstorms NXT
      Engaging Undergraduate Programming Students: Experiences using Lego Mindstorms NXT In this paper, the experiences gained in adopting an approach to first year undergraduate programming classes which attempts to engage the students in problem-solving and teamworking activities are discussed. Both have a significant role to contribute in the development of employability skills. The approach taken makes use of Alice to introduce programming concepts and Lego Mindstorms NXT kits to develop Java programming skills. The module assessments combine individual and team-based components, encouraging the students to engage with their peers in order to solve the challenges they are set. This paper reports on the results achieved by the students on the module over a four year period which correlates to the introduction of the changes to the module design. The paper also considers the views of the students gathered from anonymous module evaluation forms.

      Continue reading 

    • exhibitor - A Feasibility Study on using Clustering Algorithms in Programming Education Research
      A Feasibility Study on using Clustering Algorithms in Programming Education Research Designing an experiment for programming education research, in which collecting and interpreting a large number of qualitative data about programmers is required, needs careful consideration in order to validate the experiment. When it comes to finding a pattern in the programming behaviour of a specific group of programmers (e,g. novice, intermediate or expert programmers), one of the critical issues is the selection of similar participants who can be placed in one group. In this study we were interested in finding a method that could shorten the path to finding participants. Therefore, the use of clustering algorithms to group similar participants was put to test in order to investigate the effectiveness and feasibility of this approach. ...

      Continue reading 

    • exhibitor - Building a Cloud Based Systems Lab
      Building a Cloud Based Systems Lab The system administration lab at the University of Cincinnati consists of 24 high-end desktop PCs, each loaded with client virtualization software. The lab is limited to 24 students per class and does not offer remote access to the virtual machines. The students must either wait for open lab hours or purchase their own high-end systems to work on their schoolwork. To expand the number of classes taught and enable remote access to the lab, the authors created a Microsoft-based private cloud accessible from any computer on the university’s network. VPN entry to the network allows students to login to the system using a web browser to access their VM’s from anywhere in the world.

      Continue reading 

    • exhibitor - IPv6 Certification and Course Development
      IPv6 Certification and Course Development The need to train IT professionals, especially network engineers, in the use of Internet Protocol version 6 (IPv6) continues to grow as adoption of IPv6 continues to rise. The adoption of IPv6 is driven by the IPv4 address space depletion, the proliferation of managed devices, the proliferation of mobile wireless devices, and government initiatives. An undergraduate stand-alone course in IPv6 is discussed including previous experiences starting in 2006. The current IPv6 course offering, based on a partnership with Nephos6 Inc. as the pilot of the first Nephos6 Academy, is reviewed including course topics, laboratory environment, and certification. ...

      Continue reading 

    • exhibitor - Meeting MDG 2: Can IT Save Us?
      Meeting MDG 2: Can IT Save Us? While there continues to be rapid growth in the deployment of IT-based teaching technology in the developed world, there is a much greater need to find an effective means of using such technology to reach millions of underserved children in the developing world. This paper briefly looks at the problem, the technology, and how the latter may mitigate the former.

      Continue reading 

    • exhibitor - Integrating Mobile Storage into Database Systems Courses
      Integrating Mobile Storage into Database Systems Courses The proliferation of smartphones and tablet computers is the newest paradigm shift occurring in the field of computing education. Mobile devices create serious resource and performance constraints that developers must keep in mind when creating applications for these platforms. In order to ensure that future developers have the knowledge required to create quality software solutions, academic institutions must seek to integrate mobile devices into their curricula. This paper presents an approach to integrate mobile application development in database systems courses, in the form of a short module designed to cover the approaches for persistent storage available on mobile devices. ...

      Continue reading 

    • exhibitor - Multi-faceted Support for MOOC in Programming
      Multi-faceted Support for MOOC in Programming Many massive open online courses (MOOC) have been tremendously popular, causing a stir in academic institutions. The most successful courses have reached tens of thousands of participants. In our MOOC on introductory programming, we aimed to improve distinctive challenges that concern most of the open online courses: allowing and requiring the participants to be more active in their online learning (“flipped-classroom”), demanding them to go deeper than typical CS1 course, and added incentives for participant retention by treating the course as a formal entrance exam to CS/IT degree. Our Extreme Apprenticeship (XA) method for programming education appeared to be successful in an online environment as well.

      Continue reading 

    • exhibitor - A Modified Team-Based Learning Methodology for Effective Delivery of an Introductory Programming Course
      A Modified Team-Based Learning Methodology for Effective Delivery of an Introductory Programming Course This paper sheds the light on an attempt to use a pedagogy integrating Team-Based Learning (TBL) for effective learning and hands-on experience in an introductory programming course. We have adopted a modified version of TBL to study its e ect on students learning and to examine how teams intra- and inter-team active interactions influence students' learning and grades. Therefore, the objectives of this work is to evaluate whether the proposed modi ed TBL methodology would or would not improve students' experience of in-class engagement and their attitude about the value of using teams for learning, compared with experiences students would have had in the traditional lecture format. ...

      Continue reading 

    • exhibitor - IT Problem Solving: An Implementation of Computational Thinking in Information Technology
      IT Problem Solving: An Implementation of Computational Thinking in Information Technology This paper describes the implementation of information technology problem-solving constructs and scenarios designed to cultivate computational thinking in information technology education at the college level via a course entitled “IT Problem Solving.” A project of Broadening Advanced Technological Connections (BATEC), these scenarios were developed by a team of researchers under the auspices of an NSF CPATH grant focusing on adapting Computational Thinking as defined by Jeanette Wing into a more applied framework in partnership with and validated by a broad set of Information Technology (IT) professionals. The methodologies used within this highly successful course at Bunker Hill Community College may be of interest to other departments with existing IT programs that would like to take advantage of the strengths of the problem solving approach.

      Continue reading 

    • exhibitor - The Pedagogical Value of “Eduployment”: Information Technology Internships in Rural Areas
      The Pedagogical Value of “Eduployment”: Information Technology Internships in Rural Areas Providing internships for Information Technology students represents a significant issue to institutions of higher education located in rural areas where few if any organizations exist with sufficient resources to support such programs within a manageable transportation distance. This paper documents our experiences with an approach we refer to as “Eduployment” a program designed to address in part the rural internship problem.

      Continue reading 

    • exhibitor - The Geographic Information Science and Technology and Information Technology Bodies of Knowledge: An Ontological Alignment
      The Geographic Information Science and Technology and Information Technology Bodies of Knowledge: An Ontological Alignment In this paper, we present a philosophical discussion of ontological alignments between the fields of Geographic Information Science and Technology (GIS & T) and Information Technology (IT) based on existing bodies of knowledge (BOKs). We argue that tighter integration of concepts from GIS & T into IT curriculum can provide three specific opportunities for IT education - enhanced spatial thinking, new interdisciplinary and innovative application areas, and student employment opportunities. We also discuss specific ideas for curricular integration based on the alignments and provide a list of free and open source GIS & T software, data and learning resources for IT educators interested in incorporating GIS & T concepts and technologies into their teaching.

      Continue reading 

    • exhibitor - Panel: Defining IT Research
      Panel: Defining IT Research Information Technology emerged as a separate computing discipline primarily because the computing disciplines that were taught in universities at the time, in particular computer science and information systems, did not meet the needs of employers. In particular, the existing computing disciplines did not meet employer needs for IT infrastructure managers. While IT was successful in meeting employer needs, it was slow to develop a distinct research agenda, and it has become clear that, if it is to gain credibility in an academic environment, it needs to do so.

      Continue reading 

    • exhibitor - Panel: Interactive Learning Online: Challenges and Opportunities
      Panel: Interactive Learning Online: Challenges and Opportunities Higher education is a labor-intensive sector. Smaller classes, more faculty-student direct interactions, prompt and individualized feedback, and more hands-on and collaborative learning with peers raise the quality of student education. Valuable person-toperson interactions, on the other hand, are costly and, to complicate matters, indicative of the Baumol’s cost disease [1]. Labor-intensive sectors that are dominated by personal services, such as education and health care, do not have rising productivity through technological innovations. These “stagnant sectors”, says Willliam Baumol, keep up with salaries in sectors where more is produced with less, like in manufacturing, by raising costs.

      Continue reading 

    • exhibitor - Transforming Programming-Intensive Courses with Course-Embedded Research
      Transforming Programming-Intensive Courses with Course-Embedded Research In this paper, we discuss the Software Engineering Research Project (SERP) initiated at GGC College, a public four-year institution in southeastern United States. The long-term goal of SERP involves motivating students to pursue graduate degrees, research careers, or challenging industry work. Before students can engage in software engineering research, they need to develop a deeper appreciation for professional practice, scholarly literature, and research paradigms. To that end, we have identified activities to embed in two junior-level programming-intensive courses: Software Development I and Advanced Programming. ...

      Continue reading 

    • exhibitor - Three Years of Design-based Research to Reform a Software Engineering Curriculum
      Three Years of Design-based Research to Reform a Software Engineering Curriculum Most of the research-oriented computer science departments provide software engineering education. Providing up-to-date software engineering education can be problematic, as practises used in modern software development companies have been developed in the industry and as such do not often reach teachers in university contexts. The danger, and often the unfortunate reality, is that institutions giving education in software engineering end up teaching the subject using outdated practices with technologies no longer in use. In this article we describe a three-year design-based research where the goal has been to design and reform a software engineering subtrack within our bachelor curriculum that would make it possible for the students to have strong up-to-date theoretical and practical skills in software engineering without a need to remove any of the existing theoretical aspects.

      Continue reading 

    • exhibitor - Supporting the Review of Student Proposal Drafts in Information Technologies
      Supporting the Review of Student Proposal Drafts in Information Technologies In many cases, academic programs or courses conclude with a thesis or research proposal text, elaborated by students. The review of such texts is a heavy load, especially at initial stages of drafting. This paper proposes a model that allows linguistic and structural review of some essential elements in proposal drafts of undergraduate students. The model aims to support the review from vocabulary to the argumentation in the draft, and is part of an intelligent tutor to monitor student progress. This work presents the initial results in terms of lexical and global coherence analysis of proposal drafts of students. Lexical analysis is done in terms of lexical density, lexical diversity, and sophistication. Global coherence is evaluated using the Latent Semantic Analysis technique. Our results show that the level reached so far by the analyzer is adequate to support the review, taking into account for one section the level of agreement with human reviewers.

      Continue reading 

    • exhibitor - Dwindling numbers of female computer students: What are we missing?
      Dwindling numbers of female computer students: What are we missing? There is a common agreement among researchers that women are under-represented in both 2-year and 4-year collegiate computer study programs. In spite of twenty years of research, the number of women graduating with computer degrees continues to decline, suggesting that perhaps there are causal factors that have not been identified. This paper describes an alternate approach; asking a group of female students who are pursuing a computer technology degree at a community college to describe experiences which have affected their academic success. A significant finding was that the women struggled to understand the [deductive] problem solving method used by the instructors and the pace of the classes made it difficult for them to work out their own problem solving approach. (This paper is taken from a broader dissertation which explored other facets of the women’s experiences as well.)

      Continue reading 

    • exhibitor - Engaging Students by Intertwining Puzzle-Based and Problem-Based Learning
      Engaging Students by Intertwining Puzzle-Based and Problem-Based Learning In this paper, we describe our experience in a first-year computer science course on problem solving that is aimed at non-majors. The majority of the target audience of this course is from management and social science faculties. The course is unique in the sense that it covers proper problem solving skills that are typically only covered in a course directed at computer science or engineering students. We describe how puzzles are used as bait that lures the target audience to subjects such as logic, algorithms, and graph theory. That is, we discuss how we intertwine puzzle-based and problem-based learning in order to engage, an often unmotivated, crowd. Our initial assessment of the approach shows that the use of puzzles is perceived by students as helpful to learn the course material. Furthermore, it is contributing to their interest in computing.

      Continue reading 

    • exhibitor - Comprehensive Design of Cyber Physical Systems
      Comprehensive Design of Cyber Physical Systems In recent years there has been a confluence between different fields addressing the broad field of embedded computer systems (cyber-physical systems). Traditional microcontroller-based systems have become more capable and now frequently feature 32-bit processors with networking capabilities. Single-board computers have shrunk to credit-card size and low-cost systems are available—significantly overlapping the application domain of microcontroller systems and, thirdly, mobile platforms (smartphones, tablets, e-readers etc.) also share many characteristics of these systems and overlap their design and application domains. These systems each have their own design communities, tools and standard approaches. However their commonality and overlapping application domains indicate that they share common design problems. The evolution into newer application areas also brings new problems. The situation becomes more complex when these systems are integrated into larger diverse systems. Design approaches and design problems for these different types of embedded system are reviewed. Overlapping and non-overlapping characteristics and design issues are analyzed. A comprehensive design approach tailored to these cyber-physical systems is proposed. The comprehensive approach addresses design issues not only for all three of the overlapping fields but also systems that incorporate aspects from multiple fields. It also includes factors sometimes neglected when systems are developed within their own narrower design domains. One of the findings of this investigation is that design in this domain requires a diverse set of skills, usually only found in multi-disciplinary teams. One discipline that is needed but has not traditionally contributed much in this domain is Information Technology. Another finding is that designers trained in the IT discipline with a systems-oriented approach have specific design skills that are necessary for successful design of these diverse systems.

      Continue reading 

    • exhibitor - A Survey of SCADA and Critical Infrastructure Incidents
      A Survey of SCADA and Critical Infrastructure Incidents In this paper, we analyze several cyber-security incidents involving critical infrastructure and SCADA systems. We classify these incidents based on Source Sector, Method of Operations, Impact, and Target Sector. Using this standardized taxonomy we can easily compare and contrast current and future SCADA incidents.

      Continue reading 

    • exhibitor - Improving Accuracy in Face Tracking User Interfaces using Consumer Devices
      Improving Accuracy in Face Tracking User Interfaces using Consumer Devices One form of natural user interaction with a personal computer is based on face pose and location. This is especially helpful for users cannot effectively use common input devices with their hands. A characteristic problem of such an interface, among others, is that face movement is expected to be small and limited relative to a significantly larger control area (e.g. a full resolution monitor). In addition, vision-based algorithms and technologies that enable such interfaces introduce noise that adversely affects usability. This paper describes some of these problems in detail and presents potential solutions. Some basic face tracking user interfaces with different configurations were implemented and statistically evaluated to support the analysis. The different configurations include the use of 2D and depth images (from consumer depth sensors), different input styles, and the use of the Kalman filter.

      Continue reading 

    • exhibitor - Teaching Mobile Web Application Development: Challenges Faced And Lessons Learned
      Teaching Mobile Web Application Development: Challenges Faced And Lessons Learned Given the increasing popularity of smartphones and their accompanying applications, a number of Higher Education (HE) institutions in the UK are offering a mobile applications development module as part of their undergraduate degrees. Each institution has their own method of implementing such a module and will also have certain restrictions to work within. This paper reports on the author’s experiences of delivering a Mobile Application Development module to 3rd year undergraduate Web Systems Development (WSD) students and the challenges faced in developing an alternative curriculum for a module originally intended for Computing students with experience using the Java programming language. Module evaluations indicate that the alternative curriculum provided to WSD students was well received and the practical hands-on tutorials used in the delivery of the module give students a sense of empowerment and the confidence they need to succeed.

      Continue reading 

    • exhibitor - App Inventor for Android in a Healthcare IT Course
      App Inventor for Android in a Healthcare IT Course App Inventor for Android is a new programming environment that allows novice programmers to build applications for Android mobile devices. In this paper, we describe a healthcare IT course in which students with little or no programming background built healthcare related mobile applications. The course was designed based on the principles of studio-based learning, with students completing and sharing projects of their own choosing. Mobile applications were used to illustrate the role of IT applications in healthcare and teach design and user interface principles. In this paper, we discuss our experiences with this augmented course, describing the rationale, the process of introducing the new material, the student-designed applications, and the results from the course evaluation.

      Continue reading 

    • exhibitor - Panel: CS/IT Outreach from a Canadian Perspective
      Panel: CS/IT Outreach from a Canadian Perspective Computer Science Education Week (a.k.a. CSEdWeek) [3], officially recognized in the United States, has also helped to raise the profi le of Computer Science Education in Canada and to start many conversations about computer science education that typically find receptive audiences across many sectors. Yet, the focus does not need to be computer science alone. The Association for Computing Machinery has two special interest groups explicitly dedicated to education: SIGCSE for computer science and SIGITE for information technology. Looking at the CC2005 document [5], one also fi nds mention of computer engineering, information systems, and software engineering. Still more areas, such as bioinformatics, may be included in future computing curricula surveys. Programming can be identifi ed as a common thread in these areas. As educators, we do not expect that all students who take programming will pursue computer science or information technology in post-secondary education. However, we do want students to choose programming over being programmed [7]. In a 2009 Conference Board of Canada survey of young people, most could not identify an ICT (Information and Communication Technology) job. However, ICT jobs are everywhere with only about half inside the traditional information technology sector. Students, parents, teachers, guidance councilors, and school administrators need to see computing as "fun, cool, creative, and social" [8] and a great choice for a rewarding career. Computing curriculum is not standardized across provinces, where it exists in various stages of renewal. Ideally, students will be exposed to CS/IT at an age when they are interested in exploring the possibilities that it presents. K-12 teachers, both pre-service and in-service, need support and resources to help them encourage students in computational thinking and CS/IT. Although it may be too late to attract students new to CS/IT in Grade 12 as potential post-secondary majors, post-secondary education should provide pathways for these students to incorporate CS/IT into their programs of study. The panel will give a representation of very encouraging CS/IT outreach eff orts in Canada off ered by various organizations working in this space. These include (in alphabetical order): the Canadian Association of Computer Science/Association d'Informatique Canadienne (CACS/AIC), comprising post-secondary institutions off ering Computer Science degrees; the Canadian Information Processing Society (CIPS), known as Canada's Association of I.T. Professionals; the Canadian Coalition for Tomorrow's ICT Skills (CCICT), an industry-led coalition of employers, universi- ties and industry organizations with the aim of ensuring availability of ICT professionals for Canadian organizations; and the Computer Science Teachers Association (CSTA - international, with chapters forming across Canada), a membership organization that supports and promotes the teaching of computer science and other computing disciplines.

      Continue reading 

    • exhibitor - Experience with a Cross-Disciplinary Aggregated Glossary of Technical Terms
      Experience with a Cross-Disciplinary Aggregated Glossary of Technical Terms A glossary typically provides a binding of terminology to concepts specific to a particular document or specialty. What would an aggregation of these concept descriptions reveal about how specialists in various fields use terminology? In particular would it help students and educators understand how terminology is used by specialists with whom they need to communicate? This paper provides a status report on an effort to find out. ...

      Continue reading 

    • exhibitor - Using Student Professional Development Planning to Inform Program Review
      Using Student Professional Development Planning to Inform Program Review Development and modification of academic programs is enhanced by incorporating input from the stakeholders of the program. This paper discusses the process used by an Information Assurance and Security (IAS) program to obtain input from students during their final year of the program. ...

      Continue reading 

    • exhibitor - Poster: Green IT: Serving Multiple Purposes
      Poster: Green IT: Serving Multiple Purposes Data centers require 40 times the energy requirements of a regular office. Projections show that IT growth will continue to increase, with annual network growth at 45%. Increased energy demand in IT is growing rapidly as the world becomes more industrialized. Increasing energy demands results in an increase in both costs and global warming. To be competitive and a good world citizen means reducing IT energy costs. This poster discusses teaching materials to prepare the educator and the student in this relevant topic. Teaching this subject helps to achieve five ABET program goals, including ethics and local/global impact. It also enables students to experiment with electricity, graphs, and a lab report.

      Continue reading 

    • exhibitor - Poster: Assisting Students with Disabilities in Distance Education: An Exploratory Study into Their Experiences
      Poster: Assisting Students with Disabilities in Distance Education: An Exploratory Study into Their Experiences The escalation in DE presents both opportunities and challenges to students with disabilities. For students with disabilities, DE technology can help them read when they cannot see and learn when they have the desire to study. However, when the proper care is not taken in the development of these technological resources and tools, DE courses can be inaccessible to these students. The current study seeks to investigate how to assist students with disabilities in DE environments, and ultimately, to improve the role that technology plays in the distance education of students with disabilities in the higher education arena.

      Continue reading 

    • exhibitor - Poster: Desktop as a Service Proof of Concept
      Poster: Desktop as a Service Proof of Concept Desktop as a Service is an idea that has taken root in enterprises today, but has not reached consumers. In order to show this, a proof of concept lab was constructed. The proof of concept lab that the authors devised shows that this idea is viable. The lab uses a virtual desktop infrastructure environment. The environment uses VMWare’s View solution on top of their hypervisor and virtualization management server. These solutions provide the backbone of the environment that is used to access desktops from mobile devices anywhere and anytime. The desktops provided are persistent which allows users to keep their settings and data in a single location.

      Continue reading 

    • exhibitor - Poster: Real-world Testing: Using FOSS for Software Development Courses
      Poster: Real-world Testing: Using FOSS for Software Development Courses We designed a self-contained learning module on testing and free and open source software (FOSS) for a junior-level software engineering course. In this three-part module, students first learned software quality assurance concepts, and then used JUnit to create unit tests for their code. After being familiar with JUnit from a user perspective, students were required to investigate a defect reported in the JUnit code. Students were required to reproduce the problem, write test cases, and outline an approach for fixing the problem. In this pilot study, we conducted pre and post surveys of students’ knowledge of and interest in FOSS. In the poster, visual data will be presented summarizing the results obtained.

      Continue reading 

    • exhibitor - Poster: Cloud Computing Performance Benchmarking and Virtual Machine Launch Time
      Poster: Cloud Computing Performance Benchmarking and Virtual Machine Launch Time This research is to study the performance of cloud computing platforms in the perspective of information technology (IT) management. Two separate test clouds of Eucalyptus and OpenStack were established on identical hardware. The BYTE UNIX benchmark suite was employed to conduct various performance tests on both clouds. While the Open-Stack cloud out performed Eucalyptus considerably in the larger size copy test, the Eucalyptus cloud performed better than the OpenStack in the tests of serial excel and serial shell scripts. Scripts were written to compute the amount of time that was needed for the clouds to launch a virtual machine (VM) in two different ways. On average, it took a shorter time to launch a VM instance in both clouds when several VMs were created simultaneously than that when they were created one by one, the results showed a variation with different numbers of VMs that were launched concurrently.

      Continue reading 

    • exhibitor - Poster: Identifying the Link Between Project Management Standards and Practices in IT Education and the Industry Expectations and Requirements
      Poster: Identifying the Link Between Project Management Standards and Practices in IT Education and the Industry Expectations and Requirements Is current university-level education in IT project management meeting industry needs and expectations? The purpose of this project overview poster is to highlight a research plan to identify critical IT project management participation skills that are required of graduates of computer information systems and other information technology programs. The results of the survey, examining the critical project management skills from the point of view of actual project managers will be used to inform and create an industry focused project management course and provide new insight into contextual factors affecting IT project success.

      Continue reading 

    • exhibitor - EMC Academic Alliance - Educating Future IT Professionals
      EMC Academic Alliance – Educating Future IT Professionals Learn how you can enhance student career prospects in the world of IT through the Academic Alliance. The program offers colleges and universities around the globe unique 'open' curriculum-based education, such as information storage and management, cloud computing and big data analytics.

      Continue reading 

  • Conference Registration

     

    SIGITE/RIIT 2012

    Canada , Calgary, Alberta·October 10 - 13, 2012

    Registration Details
    $310 ACM Members Early (Ends Aug 31)
    $320 Non-Members Early (Ends Aug 31)
    $340 ACM Members (After Aug 31)
    $370 Non-Members (After Aug 31)
    $50 Student

    register for the event 

  • Hotel Bookings

     

    The SIGITE 2012 conference itself be held in the Hotel Arts, which is a 175-room, full-service boutique hotel in the exciting heart of Calgary.

    Hotel Arts
    119 - 12th Avenue SW
    Calgary, AB T2R 0G8
    Phone: 403.266.4611
    Fax: 403.237.0978
    Toll-free: 1.800.661.9378
    Email: info@hotelarts.ca
    Bookings: reservations@hotelarts.ca

    Mention SIGITE 2012 or ACM or Association of Computing Machinery to get the special room rate.