Skip to main content

Targeting Teaching & Learning

Turner College faculty continue to be at the forefront of research that extends teaching and learning in their individual disciplines.  A prime example is forthcoming research on academic dishonesty by assistant professor of management Mark James and his colleagues Gloria Miller, of Austin Peay State University, and Tyler Wyckoff, of Bank of the Sierra.  James and his colleagues study 401 students in order to identify common motivations for Chinese students to plagiarize on written English assignments.  According to their analysis, the most significant factor relating to likelihood to self-report plagiarism for Chinese students is the belief in a “standard answer,” which represents the correct answer to a given question.  Moreover, students who believe that imitation of experts is important to learning are more likely to self-report plagiarism, while business students are generally more likely to self-report plagiarism than non-business students.  As the authors conclude, their research, which appears in a future issue of the Journal of Business Ethics, provides key insights into the English writing plagiarism behaviors of Chinese students studying in Western-style higher education institutions.

In research appearing in the 2017 Proceedings of the ACM SIFCSE Technical Symposium on Computer Science Education, TSYS School assistant professor Yesem Peker points out that although cryptography is a major area of study that provides mechanisms to achieve confidentiality, integrity, authenticity, and non-repudiation in information and computer security, teaching cryptography is often challenging due to the mathematics forming the foundation of the subject.  Peker’s study introduces the basic functions and terminology of cryptography without delving into the mathematics through separate teaching modules focusing on symmetric key encryption, public key cryptography, hash functions, and digital signatures and certificates.  Each module begins with a presentation of the topic and proceeds to various hands-on activities.  Finally, the study provides computer science instructors with access to presentations and hands-on exercises as well as supplementary material such as assignments for students and questions for assessment.   

Pedagogical research by TSYS School faculty Yien Wang and Jianhua Yang asserts that the teaching of ethical hacking and vulnerability scanning is a key element to the success of a university’s cybersecurity curriculum.  Relatedly, their research, which appears in the 2017 Proceedings of the International Conference on Advanced Information Networking & Applications, both reviews the state of the art of current open source vulnerability scanning tools and introduces a virtual lab environment as part of an overall lab design for enhancing instruction related to understanding the vulnerabilities in a computer system.  The researchers also provide the details of their hands-on lab design through use of the vulnerability scanning tool known as OpenVAS.  To support their work, the study reviews learning outcomes after conducting the hands-on labs in their own cybersecurity courses at Columbus State University.

That same 2017 Proceedings also offers additional pedagogical research by Yang and his colleagues Yongzhong Zhang of Shanghai Open University and Guoqing Zhao of the Beijing Institute of Petrochemical Technology that proposes five separate modules for integrating the most popular stepping-stone intrusion detection techniques into the cybersecurity curriculum.  The study first summarizes the various stepping-stone intrusion detection processes, and proceeds by developing 10 labs on separate topics, such as creating a stepping-stone intrusion, comparing thumbprints, estimating the length of a connection chain, and identifying crossover packets, that are designed to help students to further assimilate the techniques on stepping-stone intrusion and its detection.

Lastly, Yang teamed with TSYS School Chair Wayne Summers and Dianyuan Han of Weifang University on additional research published in the 2017 Proceedings that focuses on the recent trend of offering courses on steganography techniques in cybersecurity curricula.  These researchers develop various stenography modules and hands-on labs that are designed to integrate the principles of steganography, steganographic techniques, and steganalysis into university degree programs in cybersecurity. Three of the lab exercises include steganography implementation in HTML, TCP/IP, and digital images. 

Recent research by Turner College economics professor Frank Mixon and his colleagues Carlos Asarta, of the University of Delaware, and Steven Caudill, of Florida Atlantic University, points out the difficulty that economics instructors often face in terms of identifying pedagogical examples that are relatable to the majority of their students.  To address this issue, their study appearing in a 2017 issue of International Review of Economics Education presents a timely and engaging example of a “public good” – Patreon music creations.  Patreon is an Internet company that offers an outlet for financially supporting independent musicians who share their YouTube-based music creations with fans.  The study defines and illustrates the characteristics that make these musical creations “public goods,” explaining also how music fans willingly support these creations from a financial standpoint even though they are available for viewing through YouTube without charge.

TSYS School faculty Rania Hodhod and Hillary Fleenor collaborated on research published in the 2017 Proceedings of the International Conference on Advanced Intelligent Systems and Informatics that responds to the initiative to enhance computer science education from both the National Science Foundation (NSF) and the White House Office of Science and Technology Policy (OSTP).  These researchers describe the results of a text mining process that analyzes the academic literature in order to find trends for designing educational games that enhance computer science education, in addition to identifying existing gaps in the curricula, each of which make use of Voyant, a text mining tool.  Their analysis of the text mining results from 204 published studies provides insight into how learning theories have been used in computer science education and guides future research by identifying various learning theories that should be considered in designing educational games that are used to teach computer science topics, such as data structures.

Comments

Popular posts from this blog

Seven Turner College Management and Marketing Faculty Have Combined to Produce Eight A-Level Journal Publications Between 2021 and the Present

A number of faculty in the Turner College's Department of Management and Marketing, which includes faculty in management information systems, have produced A-level journal publications in the last few years. This report covers that activity, starting with John Finley , the chairperson of the department. Professor Finley published a paper in the Journal of Computer Information Systems in 2022.      Finley is joined by Kirk Heriot , the Crowley Distinguished Chair in Entrepreneurship. Heriot, who earned a PhD in management from Clemson University, published in a 2021 issue of Small Business Economics . One of the study's co-authors, Andres Jauregui of Fresno State University, was previously a member of the Turner College's economics faculty.      Next is Johnny Ho , a professor of management, who has a 2022 publication in the Journal of Computer Information Systems . Ho has won CSU's Excellence in Research Award on multiple occasions, while he has compiled 2...

TSYS School, Jianhua Yang, Lixin Wang Each among Top Five in the World

New research by computer scientists in the School of Information Technology at Universiti Utara Malaysia that ranks institutions and individuals on the basis of scholarship in the area of stepping-stone attacks heaps praise on the Turner College’s TSYS School of Computer Science and two of its faculty – Jianhua Yang and Lixin Wang .   The article, published in the April 2023 issue of the International Journal of Research in Engineering and Science , provides a bibliometric analysis of both publication and citation data from 2000 to September of 2022 related to research on stepping-stone intrusion.   Among several results, it reports that Columbus State University ranks second worldwide, trailing only the University of Houston, using total publications on the subject as the basis of comparison.   A number of other U.S. institutions appear in the top 10, including third-ranked North Carolina State University, fourth-ranked University of Illinois, sixth-ranked Iowa State U...

New Butler Center Report Identifies Employment Gaps in the Columbus Area

Officials in the Turner College's Butler Center for Research and Economic Development recently put the finishing touches on an extensive report on trends in educational programs and occupations in the Columbus area. The report also includes data on business and technology trends.  According to Fady Mansour , Director of the Butler Center, there are several key takeaways from the report regarding 10 occupational gaps that currently exist in the Columbus area. First,  software development occupation exhibits the biggest labor shortage, with the report adding that the TSYS School has a bachelor's degree program in information technology along with a new AI track for the bachelor's degree in computer science, both of which can qualify students for this occupation. Other educational programs are in demand, such as computer programming and cloud computing. Second, there is a gap of 30 employees per year in general and operations management. This gap could be addressed by the Turn...