Skip to main content

Targeting Teaching & Learning

Turner College faculty continue to be at the forefront of research that extends teaching and learning in their individual disciplines.  A prime example is forthcoming research on academic dishonesty by assistant professor of management Mark James and his colleagues Gloria Miller, of Austin Peay State University, and Tyler Wyckoff, of Bank of the Sierra.  James and his colleagues study 401 students in order to identify common motivations for Chinese students to plagiarize on written English assignments.  According to their analysis, the most significant factor relating to likelihood to self-report plagiarism for Chinese students is the belief in a “standard answer,” which represents the correct answer to a given question.  Moreover, students who believe that imitation of experts is important to learning are more likely to self-report plagiarism, while business students are generally more likely to self-report plagiarism than non-business students.  As the authors conclude, their research, which appears in a future issue of the Journal of Business Ethics, provides key insights into the English writing plagiarism behaviors of Chinese students studying in Western-style higher education institutions.

In research appearing in the 2017 Proceedings of the ACM SIFCSE Technical Symposium on Computer Science Education, TSYS School assistant professor Yesem Peker points out that although cryptography is a major area of study that provides mechanisms to achieve confidentiality, integrity, authenticity, and non-repudiation in information and computer security, teaching cryptography is often challenging due to the mathematics forming the foundation of the subject.  Peker’s study introduces the basic functions and terminology of cryptography without delving into the mathematics through separate teaching modules focusing on symmetric key encryption, public key cryptography, hash functions, and digital signatures and certificates.  Each module begins with a presentation of the topic and proceeds to various hands-on activities.  Finally, the study provides computer science instructors with access to presentations and hands-on exercises as well as supplementary material such as assignments for students and questions for assessment.   

Pedagogical research by TSYS School faculty Yien Wang and Jianhua Yang asserts that the teaching of ethical hacking and vulnerability scanning is a key element to the success of a university’s cybersecurity curriculum.  Relatedly, their research, which appears in the 2017 Proceedings of the International Conference on Advanced Information Networking & Applications, both reviews the state of the art of current open source vulnerability scanning tools and introduces a virtual lab environment as part of an overall lab design for enhancing instruction related to understanding the vulnerabilities in a computer system.  The researchers also provide the details of their hands-on lab design through use of the vulnerability scanning tool known as OpenVAS.  To support their work, the study reviews learning outcomes after conducting the hands-on labs in their own cybersecurity courses at Columbus State University.

That same 2017 Proceedings also offers additional pedagogical research by Yang and his colleagues Yongzhong Zhang of Shanghai Open University and Guoqing Zhao of the Beijing Institute of Petrochemical Technology that proposes five separate modules for integrating the most popular stepping-stone intrusion detection techniques into the cybersecurity curriculum.  The study first summarizes the various stepping-stone intrusion detection processes, and proceeds by developing 10 labs on separate topics, such as creating a stepping-stone intrusion, comparing thumbprints, estimating the length of a connection chain, and identifying crossover packets, that are designed to help students to further assimilate the techniques on stepping-stone intrusion and its detection.

Lastly, Yang teamed with TSYS School Chair Wayne Summers and Dianyuan Han of Weifang University on additional research published in the 2017 Proceedings that focuses on the recent trend of offering courses on steganography techniques in cybersecurity curricula.  These researchers develop various stenography modules and hands-on labs that are designed to integrate the principles of steganography, steganographic techniques, and steganalysis into university degree programs in cybersecurity. Three of the lab exercises include steganography implementation in HTML, TCP/IP, and digital images. 

Recent research by Turner College economics professor Frank Mixon and his colleagues Carlos Asarta, of the University of Delaware, and Steven Caudill, of Florida Atlantic University, points out the difficulty that economics instructors often face in terms of identifying pedagogical examples that are relatable to the majority of their students.  To address this issue, their study appearing in a 2017 issue of International Review of Economics Education presents a timely and engaging example of a “public good” – Patreon music creations.  Patreon is an Internet company that offers an outlet for financially supporting independent musicians who share their YouTube-based music creations with fans.  The study defines and illustrates the characteristics that make these musical creations “public goods,” explaining also how music fans willingly support these creations from a financial standpoint even though they are available for viewing through YouTube without charge.

TSYS School faculty Rania Hodhod and Hillary Fleenor collaborated on research published in the 2017 Proceedings of the International Conference on Advanced Intelligent Systems and Informatics that responds to the initiative to enhance computer science education from both the National Science Foundation (NSF) and the White House Office of Science and Technology Policy (OSTP).  These researchers describe the results of a text mining process that analyzes the academic literature in order to find trends for designing educational games that enhance computer science education, in addition to identifying existing gaps in the curricula, each of which make use of Voyant, a text mining tool.  Their analysis of the text mining results from 204 published studies provides insight into how learning theories have been used in computer science education and guides future research by identifying various learning theories that should be considered in designing educational games that are used to teach computer science topics, such as data structures.

Comments

Popular posts from this blog

Grant Hits Ground Running as New Turner College Marketing Intern

The Turner College's new marketing intern Lizzy Grant , a senior marketing major from Newnan who previously attended Gordon State College, where she played varsity soccer, and is scheduled to graduate from the Turner College in May of 2024, has hit the ground running in her new position. She recently played a large role in the creation of a video tour of the Synovus Center, the main campus home of the Turner College. The video helps to guide new students on where to go in the building and who they can talk to if they help. The video showcases the Student Services Center, the main lobby, and more. The video is played as part of a loop on video screens placed throughout the Synovus Center. Lizzy's list of activities at CSU is impressive. She is the Treasurer of the Turner College's Marketing Club, the President of Marketing for the Turner College's chapter of the Financial Management Association, and an Ambassador for the Turner College. She is also the Treasurer of her s

Jung Exploring Influence of Confucianism on Luxury Brand Performance in China, Japan and South Korea

In a recent chat with Turner Business , Turner College professor of marketing Sungwoo Jung made the point that luxury brands are gaining the degree of influence in many developing countries that they enjoy now in developed countries.  He has been pondering this issue as part of his international marketing research program, which typically focuses on advertising, pioneering advantages and multi-cultural analysis.  Currently, Jung is concentrating his energies on a cross-cultural analysis of brand equity that highlights luxury brands’ performance.  His research finds that China, Japan and South Korea have each seen an increase in market share for luxury brands in recent years.  As Jung explained to Turner Business , “These three countries share a common philosophical background – Confucianism.”  With that point in mind, Jung and his coauthors are currently engaged in an investigation of how Confucianism influences consumer behavior in these three Asian countries, and how that behavior im

Turner College Grad Publishes Academic Study on Corporate Culture and Strategy

Former Turner College student Tamara Todorova , now an associate professor of economics at American University in Bulgaria (AUB), recently published a study on corporate culture and strategy. Todorova earned an MBA from the Turner College in 1996 and then went on to earn a doctorate in international economics from the University of Economics - Varna in 2001. She has been on the faculty at AUB since August of 2000. Todorova's study, which appears in the current issue of the International Journal of Business Performance Management , investigates how corporate culture helps to economize on the transaction costs of internal organization. As she explains, the dimensions of corporate culture that assist in this task include increasing trust and reducing intrafirm opportunism. Todorova's study demonstrates that setting common goals and a common direction reduces the sizeable costs of internal organization. Tamara's prior research appears in Economics of Transition , International