![](https://dblp.org/img/logo.ua.320x120.png)
![](https://dblp.org/img/dropdown.dark.16x16.png)
![](https://dblp.org/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.org/img/search.dark.16x16.png)
![search dblp](https://dblp.org/img/search.dark.16x16.png)
default search action
SIGITE Conference 2018: Fort Lauderdale, FL, USA
- Tom Ayers, Steve Zilora, Bryan S. Goda, Daniel S. Bogaard:
Proceedings of the 19th Annual SIG Conference on Information Technology Education, SIGITE 2018, Fort Lauderdale, FL, USA, October 03-06, 2018. ACM 2018, ISBN 978-1-4503-5954-2
Session 1A: Papers Applied
- Chunming Gao:
Session details: Session 1A: Papers Applied. - Farzana Rahman:
Integrating Project-Based Learning in Mobile Development Course to Enhance Student Learning Experience. 1-6 - Diego M. Mendez Mena, Baijian Yang
:
Blockchain-Based Whitelisting for Consumer IoT Devices and Home Networks. 7-12 - David P. Harvie
, Tanya T. Estes, Michael J. Kranch:
Crafting a Foundation for Computing Majors. 13-17
Session 1B: Panel
- Markus Geissler:
Session details: Session 1B: Panel. - Gregory W. Hislop, Heidi J. C. Ellis, Barry M. Lunt, Stephen J. Zilora:
Panel: Attracting Students to IT Degrees. 18-19
Session 1C: Papers Research
- Deborah Boisvert:
Session details: Session 1C: Papers Research. - Luis Corral
, Ilenia Fronza
:
Design Thinking and Agile Practices for Software Engineering: An Opportunity for Innovation. 26-31 - Prateek Basavaraj, Karla A. Badillo-Urquiola, Ivan Garibay
, Pamela J. Wisniewski:
A Tale of Two Majors: When Information Technology is Embedded within a Department of Computer Science. 32-37
Session 2A: Papers Applied
- Martin Schedlbauer:
Session details: Session 2A: Papers Applied. - Qianni Deng, Xinjian Luo:
PipE2: An Innovative Pipelining Design for Collaborative Two-Stage Exams. 38-43 - Jai W. Kang, Qi Yu
, Erik Golen, Edward P. Holden:
IT Curriculum: Coping with Technology Trends & Industry Demands. 44-49 - Rob Elliott
, Xiao Luo:
Improving the Global, International and Intercultural (GII) Competencies of IT Students via Integrated Collaboration During Study Abroad. 50-55
Session 2B: Panel
- Sam Chung:
Session details: Session 2B: Panel. - Farzana Rahman:
Fostering Undergraduate Research through Mobile Development Course in PUIs. 56-57
Session 2C: Lightning Talks
- Rick Lee Homkes:
Session details: Session 2C: Lightning Talks. - Ye Diana Wang, Robert Matz:
Work In Progress - A Multidisciplinary Minor in Web Design. 58 - Sandra Gorka, Alicia McNett, Jacob R. Miller, Bradley M. Webb:
Improving the Pipeline: Lessons Learned. 59 - Chunming Gao, Bryan S. Goda:
Face-to-Face, or Online, That Is the Question. 60 - Virginia C. Carneiro de Paula:
Computer Programming is More than to Program Computers. 61 - Diane Nelson Roux:
Student Success in Online and Hybrid Courses. 62 - Barry M. Lunt, Brady Redfearn
:
CC2020-What It Is and Why You Should Care. 63
Keynote
- Tom Ayers:
Session details: Keynote. - Todd Thibodeaux:
Skills Gap Myths and Technology's Next Wave. 64-65
Session 3A: Papers Applied
- Giovanni Vincenti:
Session details: Session 3A: Papers Applied. - Yang Wang, Margaret McCoey, Heng Zou:
Developing an Undergraduate Course Curriculum on Information Security. 66-71 - Kathy S. Faggiani, Bill Dafnis, Matthew Kwan:
Experiential Learning in an Online IT Program: A Case Study of Third-Party Capstone Project Sourcing. 72-77 - Rick Trilling:
Creating a New Academic Discipline: Cybersecurity Management Education. 78-83
Session 3B: Panel
- Michael Stinson:
Session details: Session 3B: Panel. - Alan Rowland, Thomas Dawkins, James Risler, Thomas Ayers:
The Value of Industry Certifications in ITE: Panel Discussion. 84-85
Session 3C: Lightning Talks
- Ray Trygstad:
Session details: Session 3C: Lightning Talks. - Amos O. Olagunju:
Revamping the IT Curriculum with Agile and DevOps Methodology. 86 - Brandon Olson, Thomas E. Gibbons:
Applying an Agile Approach to Improve the Student Experience and Performance in a Capstone Project. 87 - Diane C. Shichtman:
Stakeholders Connecting the Curricular Guidelines to the Code. 88 - David P. Harvie
, Keith E. Major, Tanya T. Estes:
Use of Commercial Online Training to Augment Programming Language Education. 89 - Svetlana Peltsverger, Lei Li, Rebecca H. Rutherfoord:
Can We Be More Innovative with Program Revision?: Using a Data-Driven 360 Degree Program Review Model. 90 - Kirby McMaster, Brian W. Rague, Samuel Sambasivam, Stuart Wolthuis:
Software Concepts Emphasized in Introductory Programming Textbooks. 91
Session 4A: Papers Applied
- Karen P. Patten:
Session details: Session 4A: Papers Applied. - Te-Shun Chou, John Jones:
Developing and Evaluating an Experimental Learning Environment for Cyber Security Education. 92-97 - Ankur Chattopadhyay, Elizabeth Quigley, Rachel Hart, Sallie Petty:
A BERO CLF Themed Nifty Middle School Module: Teach Functional Programming Using Music and Generate Interest in Coding and Robotics. 98-103 - Chia-Chi Teng, Barry M. Lunt:
IoT-enabled Capstone. 104-109
Session 4B: Panel
- Amos O. Olagunju:
Session details: Session 4B: Panel. - Rebecca H. Rutherfoord, Richard Halstead-Nussloch, Dawn Tatum, Susan VandeVen, James K. Rutherfoord:
Creating No-Textbook IT Courses - Yes It Can Work For You. 110-111
Session 4C: Papers Research
- Robert Lutz:
Session details: Session 4C: Papers Research. - Allan Fowler, Xuelei Sherry Ni, Jon A. Preston:
The Pedagogical Potential of Game Jams. 112-116 - Marc J. Dupuis, Mercy Ebenezer:
Help Wanted: Consumer Privacy Behavior and Smart Home Internet of Things (IoT) Devices. 117-122
Session 5A: Papers Research
- Diana Wang:
Session details: Session 5A: Papers Research. - Jing (Selena) He, Meng Han, Patrick O. Bobbie:
An Energy-Efficient Secure Adaptive Cloud-of-Things (CoT) Framework to Facilitate Undergraduate STEM Education. 123-128 - Heyam H. Al-Baity
, Duaa Hamed Alsaeed
, Sahar Bayoumi
, Nora Al-Twairesh, Hend S. Al-Khalifa:
Rejuvenation of the IT Program at King Saud University: A Change Reflecting Local and Global IT Trends. 129-134 - Jared James Meyers, Derek L. Hansen, Justin Scott Giboney, Dale C. Rowe:
Training Future Cybersecurity Professionals in Spear Phishing using SiEVE. 135-140
Session 5B: Panel
- Christopher Kadlec:
Session details: Session 5B: Panel. - Farzana Rahman, Tiana Solis:
Designing Creative Assessments for Online Computer Science and IT Courses. 141-142
Session 5C: Lightning Talks
- Jeremy R. Hajek:
Session details: Session 5C: Lightning Talks. - Wenjie Wu, Zhenzhi Xu, Yingjie Victor Chen, Baijian Yang
:
Representational Fluency in Cryptography: An Eye-Tracking Study. 143 - Tolulope Awojana, Te-Shun Chou, Nicholas Hempenius:
Review of the Existing Game Based Learning System in Cybersecurity. 144 - Michael Hilt, Daniel Shao, Baijian Yang
:
RFID Security, Verification, and Blockchain: Vulnerabilities within the Supply Chain for Food Security. 145 - David A. Gould, Gregory Block, Simon Cleveland:
Using Evolutionary Systems and Ideation Techniques to Enhance Student Cybersecurity Learning. 146 - Yu Cai, Todd O. Arney:
Scripting for Administration, Automation and Security. 147 - Nicholas Hempenius, Te-Shun Chou, Lee Toderick:
Cybersecurity Competitive Labs-as-a-Service: Automated Score and Message Board Design. 148
Poster Session
- Adity Mutsuddi, Deb Frame:
Can Cognitive Science make it Easier for Novice Students to Learn to Code Functions? 149 - Heidi J. C. Ellis, Gregory W. Hislop:
Student Participation in HFOSS: Challenges and Opportunities. 150 - Young Park:
Predicting Personalized Student Performance in Computing-Related Majors via Collaborative Filtering. 151 - Xiao Luo, Connie Justice:
Improve Integrated Learning in Computer Information Technology through Cross-Curricular Instruction? 152 - Blessing Leonard, Giovanni Vincenti:
Evaluating Simpler User Interfaces for Computer Programming Educational Tools. 153 - Sandra Gorka, Alicia McNett, Jacob R. Miller, Bradley M. Webb:
Improving the Pipeline: A First Look at the Data. 154 - Karen H. Jin, Howard Eglowstein, Mihaela Sabin:
Using Physical Computing Projects in Teaching Introductory Programming. 155 - Marc J. Dupuis:
Co-Op Light: Developing a Cybersecurity Workforce through Academia-Industry Partnerships. 156 - Yong Zheng
, Mengran Liu:
Predicting Political Trends By Social Tagging. 157 - Yong Zheng
, Sridhar Srinivasan, Taehun Kim:
Exploratory Malware Analysis of Mobile Usages. 158 - Ankur Chattopadhyay, David Christian, Adam Ulman, Sallie Petty:
Towards A Novel Visual Privacy Themed Educational Tool for Cybersecurity Awareness and K-12 Outreach. 159 - Patricia Whitley, Emily Ennis, Nolan Taaca, Sweta Sneha, Hossain Shahriar
, Chi Zhang:
Reduction of Medical Errors in Emergency Medical Care. 160 - Richard R. Maiti, Aleksandr Krasnov, Marvin Wilborne:
Predicting NFRs in Agile Software Engineering. 161 - Alessandro Colombi, Ilenia Fronza
, Claus Pahl, Demis Basso:
COCONATS: Combining Computational Thinking Didactics and Software Engineering in K-12. 162 - Chi Zhang, Hossain Shahriar
:
Health Data Analytics: A Health IT Application Course. 163 - Vineet Sampat, Jeremy R. Hajek:
The Importance Of Hadoop Clusters in Educational Institutions. 164 - Yunmei Lu, Mingyuan Yan, Meng Han, Qingliang Zhang, Yanqing Zhang:
Privacy Preserving Multiclass Classification for Horizontally Distributed Data. 165
Session 6A: Papers
- Heidi Ellis:
Session details: Session 6A: Papers. - Amber Settle, Theresa A. Steinbach:
Retention Rates for the First Three Years of a Linked-courses Learning Community. 166-171 - Farzana Rahman:
Leveraging Visual Programming Language and Collaborative Learning to Broaden Participation in Computer Science. 172-177 - Meng Han, Zhigang Li, Jing (Selena) He, Dalei Wu
, Ying Xie, Asif Iqbal Baba:
A Novel Blockchain-based Education Records Verification Solution. 178-183
Session 6B: Panel
- Hollis J. Greenberg:
Session details: Session 6B: Panel. - Scott Murray, Sandra Gorka, Becky Rutherfoord, Mihaela Sabin:
Revising the ABET Information Technology Criteria to Reflect the IT 2017 Curriculum Guidelines. 184-185
Session 6C: Lightning Talks
- Eric Golen:
Session details: Session 6C: Lightning Talks. - Charith Atapattu, Sam Chung:
An Architectural Analysis of a Blockchain-Based Web Application for Supporting Smart Contracts and Hardening Security. 186 - Ilenia Fronza, Claus Pahl:
Fostering Software Engineering Principles in K-12 Through Non-Programming Activities. 188 - Erin A. Day, Kenneth W. Hall, Michael C. Stinson:
Innovation through Visualization. 189 - Eric Nersesian, Adam Spryszynski:
Incorporating Workplace Structure in a Classroom Setting. 190 - Vinesh Kannan:
Paint, Glitter, and Chatbots: Programming Activities for Novices Designed with Intellectual Need and Replay Value. 191
![](https://dblp.org/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.