Skip to main content

Targeting Teaching & Learning

Turner College faculty continue to be at the forefront of research that extends teaching and learning in their individual disciplines.  A prime example is forthcoming research on academic dishonesty by assistant professor of management Mark James and his colleagues Gloria Miller, of Austin Peay State University, and Tyler Wyckoff, of Bank of the Sierra.  James and his colleagues study 401 students in order to identify common motivations for Chinese students to plagiarize on written English assignments.  According to their analysis, the most significant factor relating to likelihood to self-report plagiarism for Chinese students is the belief in a “standard answer,” which represents the correct answer to a given question.  Moreover, students who believe that imitation of experts is important to learning are more likely to self-report plagiarism, while business students are generally more likely to self-report plagiarism than non-business students.  As the authors conclude, their research, which appears in a future issue of the Journal of Business Ethics, provides key insights into the English writing plagiarism behaviors of Chinese students studying in Western-style higher education institutions.

In research appearing in the 2017 Proceedings of the ACM SIFCSE Technical Symposium on Computer Science Education, TSYS School assistant professor Yesem Peker points out that although cryptography is a major area of study that provides mechanisms to achieve confidentiality, integrity, authenticity, and non-repudiation in information and computer security, teaching cryptography is often challenging due to the mathematics forming the foundation of the subject.  Peker’s study introduces the basic functions and terminology of cryptography without delving into the mathematics through separate teaching modules focusing on symmetric key encryption, public key cryptography, hash functions, and digital signatures and certificates.  Each module begins with a presentation of the topic and proceeds to various hands-on activities.  Finally, the study provides computer science instructors with access to presentations and hands-on exercises as well as supplementary material such as assignments for students and questions for assessment.   

Pedagogical research by TSYS School faculty Yien Wang and Jianhua Yang asserts that the teaching of ethical hacking and vulnerability scanning is a key element to the success of a university’s cybersecurity curriculum.  Relatedly, their research, which appears in the 2017 Proceedings of the International Conference on Advanced Information Networking & Applications, both reviews the state of the art of current open source vulnerability scanning tools and introduces a virtual lab environment as part of an overall lab design for enhancing instruction related to understanding the vulnerabilities in a computer system.  The researchers also provide the details of their hands-on lab design through use of the vulnerability scanning tool known as OpenVAS.  To support their work, the study reviews learning outcomes after conducting the hands-on labs in their own cybersecurity courses at Columbus State University.

That same 2017 Proceedings also offers additional pedagogical research by Yang and his colleagues Yongzhong Zhang of Shanghai Open University and Guoqing Zhao of the Beijing Institute of Petrochemical Technology that proposes five separate modules for integrating the most popular stepping-stone intrusion detection techniques into the cybersecurity curriculum.  The study first summarizes the various stepping-stone intrusion detection processes, and proceeds by developing 10 labs on separate topics, such as creating a stepping-stone intrusion, comparing thumbprints, estimating the length of a connection chain, and identifying crossover packets, that are designed to help students to further assimilate the techniques on stepping-stone intrusion and its detection.

Lastly, Yang teamed with TSYS School Chair Wayne Summers and Dianyuan Han of Weifang University on additional research published in the 2017 Proceedings that focuses on the recent trend of offering courses on steganography techniques in cybersecurity curricula.  These researchers develop various stenography modules and hands-on labs that are designed to integrate the principles of steganography, steganographic techniques, and steganalysis into university degree programs in cybersecurity. Three of the lab exercises include steganography implementation in HTML, TCP/IP, and digital images. 

Recent research by Turner College economics professor Frank Mixon and his colleagues Carlos Asarta, of the University of Delaware, and Steven Caudill, of Florida Atlantic University, points out the difficulty that economics instructors often face in terms of identifying pedagogical examples that are relatable to the majority of their students.  To address this issue, their study appearing in a 2017 issue of International Review of Economics Education presents a timely and engaging example of a “public good” – Patreon music creations.  Patreon is an Internet company that offers an outlet for financially supporting independent musicians who share their YouTube-based music creations with fans.  The study defines and illustrates the characteristics that make these musical creations “public goods,” explaining also how music fans willingly support these creations from a financial standpoint even though they are available for viewing through YouTube without charge.

TSYS School faculty Rania Hodhod and Hillary Fleenor collaborated on research published in the 2017 Proceedings of the International Conference on Advanced Intelligent Systems and Informatics that responds to the initiative to enhance computer science education from both the National Science Foundation (NSF) and the White House Office of Science and Technology Policy (OSTP).  These researchers describe the results of a text mining process that analyzes the academic literature in order to find trends for designing educational games that enhance computer science education, in addition to identifying existing gaps in the curricula, each of which make use of Voyant, a text mining tool.  Their analysis of the text mining results from 204 published studies provides insight into how learning theories have been used in computer science education and guides future research by identifying various learning theories that should be considered in designing educational games that are used to teach computer science topics, such as data structures.

Comments

Popular posts from this blog

Four Turner College Faculty Recognized for Outstanding Teaching

CSU Head Women's Soccer Coach Jay Entlich recently released a list of CSU faculty who have been chosen by a player as a member of the CSU faculty who has impacted the player in a positive way along their journey at CSU. Four Turner College faculty were included on the list, along with the player who nominated each. Management professor Phil Bryant was named by Sophia Leal , a freshman midfielder from Oxford, Georgia. Sophia attended Eastside High School and was a two-time all-region selection during her high school career. Through the first 10 games of 2024, she has scored one goal and recorded three assists.         Next, management professor John Finley was named by Lizz Forshaw , a graduate student forward from Stockton, England. Lizz, who attended IMG Academy in south Florida, has scored four goals and recorded four assists this season. During her senior year in 2023, she scored three goals and recorded two assists. As a junior in 2022, Lizz scored three goals ...

Seven Turner College Management and Marketing Faculty Have Combined to Produce Eight A-Level Journal Publications Between 2021 and the Present

A number of faculty in the Turner College's Department of Management and Marketing, which includes faculty in management information systems, have produced A-level journal publications in the last few years. This report covers that activity, starting with John Finley , the chairperson of the department. Professor Finley published a paper in the Journal of Computer Information Systems in 2022.      Finley is joined by Kirk Heriot , the Crowley Distinguished Chair in Entrepreneurship. Heriot, who earned a PhD in management from Clemson University, published in a 2021 issue of Small Business Economics . One of the study's co-authors, Andres Jauregui of Fresno State University, was previously a member of the Turner College's economics faculty.      Next is Johnny Ho , a professor of management, who has a 2022 publication in the Journal of Computer Information Systems . Ho has won CSU's Excellence in Research Award on multiple occasions, while he has compiled 2...

TSYS School, Jianhua Yang, Lixin Wang Each among Top Five in the World

New research by computer scientists in the School of Information Technology at Universiti Utara Malaysia that ranks institutions and individuals on the basis of scholarship in the area of stepping-stone attacks heaps praise on the Turner College’s TSYS School of Computer Science and two of its faculty – Jianhua Yang and Lixin Wang .   The article, published in the April 2023 issue of the International Journal of Research in Engineering and Science , provides a bibliometric analysis of both publication and citation data from 2000 to September of 2022 related to research on stepping-stone intrusion.   Among several results, it reports that Columbus State University ranks second worldwide, trailing only the University of Houston, using total publications on the subject as the basis of comparison.   A number of other U.S. institutions appear in the top 10, including third-ranked North Carolina State University, fourth-ranked University of Illinois, sixth-ranked Iowa State U...