Paper ID #49295BOARD #106: Investigating Factors Influencing Performance in an IntroductoryProgramming CourseAmanda Nicole Smith, University of Florida Amanda is an undergraduate student pursuing a Bachelor of Science in Computer Science at the University of Florida, with an expected graduation in Spring 2025. Her research interests focus on computer science education, particularly how educators can use machine learning models to provide real time intervention strategies to optimize individual student outcomes. This paper is a reflection of her commitment to improving educational strategies and fostering an inclusive
). This case study provides insights into howintegrating an industry certification exam into a foundational cybersecurity course curriculumserved as a resource and not an additional demand. The lessons learned guided further analysis todetermine whether: (1) the course effectively integrates certification requirements into thecurriculum, (2) two separate courses are necessary to fully achieve these goals, or (3) analternative approach, such as embedding certification objectives across multiple courses, wouldbe more effective.III. The Case for Applied Curriculum The University of Oklahoma created a Polytechnic Institute (OUPI) in May 2022 toaddress the high demand for advanced and applied technology in the northeast region ofOklahoma
students in the CSULA CS department, we have conducted an in-depth data analysis of student enrollment, persistence, and performance in early programming courses (CS1, CS2, and CS3) from the Fall of 2019 to the fall of 2021. During this period, the department’s female enrollment was less than 12%. 3. Through efforts in training CS instructors, the pass rates for CS equivalent courses at ELAC showed promising improvements. Better foundational preparation at ELAC is likely to improve student success post-transfer. 4. We also observed that embedding Socially Responsible Computing (SRC) components into the curriculum led to higher engagement levels.While we believe that the clear transfer pathways
and curriculum developers select the correct learning goals and activities for theirspecific student population.References [1] S. Isaac Flores-Alonso, N. V. M. Diaz, J. Kapphahn, et al., “Introduction to AI in under- graduate engineering education,” in 2023 IEEE Frontiers in Education Conference (FIE), College Station, TX, USA: IEEE, Oct. 18, 2023, pp. 1–4, ISBN: 9798350336429. DOI: 10.1109/FIE58773.2023.10343187. [2] S. Khorbotly, “Machine learning: An undergraduate engineering course,” in 2022 ASEE Illinois-Indiana Section Conference Proceedings, Anderson, Indiana: ASEE Conferences, Apr. 2022, p. 42 132. DOI: 10.18260/1-2--42132. [3] R. DeMara, A. Gonzalez, A. Wu, et al., “A crcd experience: Integrating machine learning
) and Information Systems (IS), rather than a complete overhaul of existing curricula andpedagogy. An academic degree in CS or IS with AI components is not expected to radicallytransform these fields but rather to incorporate AI through specific learning objectives. Theproposal does not advocate for curricular changes that would lead to longer graduation times orincreased cognitive load. Based on demand, we can consider several complementary approaches: 1. Minimal Change: Offer AI courses as electives, without altering the core curriculum, as a starting point. 2. Integration of AI Content: Introduce AI-related modules into existing technology- focused courses or integrate them into an introductory course on AI, machine learning
embedded systems andcontribute to the development of secure and reliable embedded technologies.However, it should be noted that this was one of 10 modules developed by our team for variousCSE/CS courses. The primary goal of developing these modules was to distribute training incybersecurity across the entire CSE/CS curriculum, providing students with a holistic view andcomprehensive cybersecurity training. Future work may focus on integrating advanced on-devicesecurity measures with real-time detection capabilities to protect production-network buildingcontrollers from cyber threats. This will provide students with hands-on experience in dealingwith sophisticated cybersecurity challenges.AcknowledgmentsThis material is based upon the work
their project and would like to extend their competition results for future publications.They mentioned that it would be achieved through an independent study that one student (fromGeography Department) would conduct during the semester, with the other student (in CSEDepartment) helping out as needed to continue the project. Finding effective approaches toextending the benefits of the workshop to achieve longer-term impact is important. We think onemechanism is to couple it with other course work or research activities. This can be arranged forthe graduate students through their research activities. For undergraduate students, it might behelpful to arrange other curriculum activities (e.g., independent studies or design labs) or
applications. Cyberattacks are increasing at an alarming rate every year. Reports areindicating that the cost of cybercrime may rise to $23 trillion by 2027. It is crucial to employ theright cybersecurity personnel with knowledge and abilities to protect the nation’s criticalinfrastructures, such as its energy, communication, water, food, and healthcare. But the publicand private sectors are facing a substantial challenge in acquiring a sufficient number of skilledsecurity personnel, and the cybersecurity workforce gap is increasing by 19% every year. Inorder to deliver the next generation of cybersecurity professionals for entry-level and junior-levelpositions, we modified our undergraduate computing curriculum by infusing cybersecuritymodules from
Paper ID #47758A Framework for Understanding the Role of Generative AI in EngineeringEducation: A Literature ReviewMs. Prarthona Paul, University of Toronto Prarthona Paul completed her undergraduate degree in Computer Engineering at the University of Toronto, and is an incoming graduate student in Engineering Education at the University of Toronto. Her research interests include engineering education practices as well as engineering leadership at the workplace and university settings and integrating of technology in engineering education.Chirag Variawa, University of Toronto Prof. Chirag Variawa is the Director, First Year
Paper ID #49218From Reflection to Insight: Using LLM to Improve Learning Analytics inHigher EducationDr. Nasrin Dehbozorgi, Kennesaw State University I’m an Assistant Professor of Software Engineering and the director of the AIET lab in the College of Computing and Software Engineering at Kennesaw State University. With a Ph.D. in Computer Science and prior experience as a software engineer in the industry, my interest in both academic and research activities has laid the foundation to work on advancing educational technologies and pedagogical interventions.Mourya Teja Kunuku, Kennesaw State University Ph.D. student at
modern learners are educated about the risks associated with being active incyberspace and the strategies that stakeholders can use to promote cyber security education inschools [7]. Mishra discussed curriculum overcrowding, the digital divide, and varying levels ofcybersecurity awareness among educators and students. He also explored the resistance tochange within educational institutions and the lack of standardized guidelines for cybersecurityeducation [8]. Ofusori, et al. conducted a comprehensive review of use of AI in cybersecurityand offered insights into the effectiveness, challenges, and emerging trends in utilizing AI forcybersecurity purposes [9]. Ari et al. studied Integrating Artificial Intelligence into CybersecurityCurriculum and
diverse fields—from healthcare toeducation—consumers, researchers and policymakers are increasingly raising concerns aboutwhether and how AI is regulated. It is therefore reasonable to anticipate that alignment withprinciples of ‘ethical’ or ‘responsible’ AI, as well as compliance with law and policy, will form anincreasingly important part of AI development. Yet, for the most part, the conventional computerscience curriculum is ill-equipped to prepare students for these challenges. To this end, we seek toexplore how new educational content related to AI ethics and AI policy can be integrated intoboth ethics- and technical-focused courses. This paper describes a two-lecture AI Policy Modulethat was piloted in a graduate-level introductory machine
majors at thecollege level. Therefore, we propose that public K-12 education must provide high-qualityinstruction not only in computer science but also in STEM fields in an integrated manner. Toachieve this, improvements in STEM education should be in conjunction with reforms in careereducation. Career education revisions include support for students to overcome traditional genderrole beliefs, along with detailed information about various STEM careers. Revisions are requiredat the college level in addition to the K-12 level. In order for STEM programs to attract students,they need to provide extensive information about the curriculum in a fashion that high schoolstudents can make knowledge-based decisions considering their STEM career paths
seamlessly into diverse educational environments 10,11 .As IoT systems grow in complexity and ubiquity, understanding their security vulnerabilitiesbecomes crucial, especially given projections of cyberattack costs that reach $10. 5 trillion by2025 12,13 . It is vital that educational programs prepare future engineers and developers withrobust knowledge of these threats 14,15,16 .Several studies illustrate the integration of IoT into educational settings. Xia et al. describe an IoTarchitecture that facilitates the integration of objects from the real world into virtual academiccommunities (VAC), adapting existing architectural frameworks to educational needs 17 . Anotherstudy highlights the success of incorporating IoT into a humanities curriculum
Heath LeBlanc f-jahan@onu.edu h-leblanc@onu.edu ECCS Department ECCS Department Ohio Northern University Ohio Northern University Abstract Linked lists are fundamental data structures in computer science, but their abstract nature can pose challenges for students, particularly those with diverse backgrounds and limited mathematical preparation. This paper presents a novel approach to teaching linked lists using Play-Doh as a hands-on, interactive manipulative combined with an analogy. The activity involves students creating and manipulating Play-Doh ”trains” to
impactstudents’ ability to learn relevant concepts in different environments as well as interaction withothers or corporate-based cybersecurity behaviors [2,3,4]. There are educational attempts made tooffer summer camps and attract high school students through summer camps however theseattempts do not include pedagogical research on better understanding of the students [8]. Similarly,a peer mentoring framework for students in an introductory Information Systems course is testedin [9] for students to interact with their peers in an upper-level elective course in cybersecurity thatfocused on Data Analytics for Cybersecurity concepts. The purpose of the tested framework wasto encourage more students to explore cybersecurity careers through peer led
Paper ID #47175A Follow-up Study of a Redesigned Cybersecurity Lab CourseDr. Peng Li, East Carolina University Peng Li received a Ph.D. in Electrical Engineering from University of Connecticut. Dr. Li is currently an Associate Professor at East Carolina University. He teaches undergraduate and graduate courses in programming, computer networks, information security, web services and virtualization technologies. His research interests include virtualization, cloud computing, cyber security and integration of information technology in education.Dr. Sohan Gyawali, East Carolina University Dr. Sohan Gyawali is currently an
utilized a Python script to process the data in the JSON file. For this purpose, itextracts text comments from the JSON file. To maintain the integrity of the comments asparagraphs, internal newlines within the text were removed. The cleaned text was then written tothe output file, with each comment followed by two newlines to ensure proper spacing. It thusenabled an efficient extraction and storage of the comments in a format suitable for thesubsequent analysis.For analysis of the comments in the comments JSON file, each comment was analyzed usingOpenAI GPT-3.5-turbo model. Through the use of the GPT LLM model, video comments werepre-processed to prepare the video comment data for the sentiment analysis. The comment datapre-processing includes