28,575 research outputs found

    How might learning technology impact on the modern delivery of learning in Scotland?

    Get PDF
    This document has been prepared following a meeting on 23 June 2010 between Michael Russell, Scottish Cabinet Secretary for Education and Lifelong Learning, and the Association for Learning Technology (ALT), represented by Seb Schmoller, Chief Executive and Dr Linda Creanor, ALT Trustee. The purpose of the document is to highlight areas which are of particular relevance to education in Scotland and to respond to specific questions raised at the meeting in Edinburgh. It has been written by members of the ALT-Scotland group, consisting of institutional ALT representatives from Scottish colleges and universities as well as Scottish-based ALT committee members whose backgrounds encompass all sectors of Scottish education

    The Need to Address Mobile Device Security in the Higher Education IT Curriculum

    Get PDF
    Mobile devices, including smartphones and tablets, enable users to access corporate data from anywhere. In 2013, people will purchase 1.2 billion mobile devices, surpassing personal computers as the most common method for accessing the Internet. However, security of these mobile devices is a major concern for organizations. The two leading mobile operating systems (OS), Googleā€™s Android OS and Appleā€™s iOS, both have security concerns as do the mobile applications and the major application markets. ā€˜Bring your own devices,ā€™ where employees supply their own equipment for work-related purposes, can cut costs for organizations, but failing to address security can significantly increase those costs. This paper focuses on the increasing need for mobile business and its related mobile device security concerns. We propose that future IT professionals should be aware of these issues and learn how to secure mobile devices through the integration of the topic into the IT Model Curriculum. Using the case of one undergraduate IT program, we developed a set of mobile device security education recommendations, which we then mapped to the IT Model Curriculum using the guidelines from Accreditation Board for Engineering and Technology (ABET). This mapping approach demonstrates one way how higher education institutions could integrate mobile device security into any IT curriculum

    On the Presence of Green and Sustainable Software Engineering in Higher Education Curricula

    Full text link
    Nowadays, software is pervasive in our everyday lives. Its sustainability and environmental impact have become major factors to be considered in the development of software systems. Millennials-the newer generation of university students-are particularly keen to learn about and contribute to a more sustainable and green society. The need for training on green and sustainable topics in software engineering has been reflected in a number of recent studies. The goal of this paper is to get a first understanding of what is the current state of teaching sustainability in the software engineering community, what are the motivations behind the current state of teaching, and what can be done to improve it. To this end, we report the findings from a targeted survey of 33 academics on the presence of green and sustainable software engineering in higher education. The major findings from the collected data suggest that sustainability is under-represented in the curricula, while the current focus of teaching is on energy efficiency delivered through a fact-based approach. The reasons vary from lack of awareness, teaching material and suitable technologies, to the high effort required to teach sustainability. Finally, we provide recommendations for educators willing to teach sustainability in software engineering that can help to suit millennial students needs.Comment: The paper will be presented at the 1st International Workshop on Software Engineering Curricula for Millennials (SECM2017

    The Global Engineer : Incorporating global skills within UK higher education of engineers

    Get PDF

    [Subject benchmark statement]: computing

    Get PDF

    Towards a framework for the integration of information security into undergraduate computing curricula

    Get PDF
    Information is an important and valuable asset, in both our everyday lives and in various organisations. Information is subject to numerous threats, these can originate internally or externally to the organisation and could be accidental, intentional or caused by natural disasters. As an important organisational asset, information should be appropriately protected from threats and threat agents regardless of their origin. Organisational employees are, however, often cited as the ā€œweakest linkā€ in the attempt to protect organisational information systems and related information assets. Additionally to this, employees are one of the biggest and closest threat-agents to an organisationā€™s information systems and its security. Upon graduating, computing (Computer Science, Information Systems and Information Technology) graduates typically become organisational employees. Within organisations, computing graduates often take on roles and responsibilities that involve designing, developing, implementing, upgrading and maintaining the information systems that store, process and transmit organisational information assets. It is, therefore, important that these computing graduates possess the necessary information security skills, knowledge and understanding that could enable them to perform their roles and responsibilities in a secure manner. These information security skills, knowledge and understanding can be acquired through information security education obtained through a qualification that is offered at a higher education institution. At many higher education institutions where information security is taught, it is taught as a single, isolated module at the fourth year level of study. The problem with this is that some computing students do not advance to this level and many of those that do, do not elect information security as a module. This means that these students may graduate and be employed by organisations lacking the necessary information security skills, knowledge and understanding to perform their roles and responsibilities securely. Consequently, this could increase the number of employees who are the ā€œweakest linkā€ in securing organisational information systems and related information assets. The ACM, as a key role player that provides educational guidelines for the development of computing curricula, recommends that information security should be pervasively integrated into computing curricula. However, these guidelines and recommendations do not provide sufficient guidance on ā€œhowā€ computing educators can pervasively integrate information security into their modules. Therefore, the problem identified by this research is that ā€œcurrently, no generally used framework exists to aid the pervasive integration of information security into undergraduate computing curriculaā€. The primary research objective of this study, therefore, is to develop a framework to aid the pervasive integration of information security into undergraduate computing curricula. In order to meet this objective, secondary objectives were met, namely: To develop an understanding of the importance of information security; to determine the importance of information security education as it relates to undergraduate computing curricula; and to determine computing educatorsā€™ perspectives on information security education in a South African context. Various research methods were used to achieve this studyā€™s research objectives. These research methods included a literature review which was used to define and provide an in-depth discussion relating to the domain in which this study is contained, namely: information security and information security education. Furthermore, a survey which took the form of semi-structured interviews supported by a questionnaire, was used to elicit computing educatorsā€™ perspectives on information security education in a South African context. Argumentation was used to argue towards the proposed framework to aid the pervasive integration of information security into undergraduate computing curricula. In addition, modelling techniques were used to model the proposed framework and scenarios were used to demonstrate how a computing department could implement the proposed framework. Finally, elite interviews supported by a questionnaire were conducted to validate the proposed framework. It is envisaged that the proposed framework could assist computing departments and undergraduate computing educators in the integration of information security into their curricula. Furthermore, the pervasive integration of information security into undergraduate computing curricula could ensure that computing graduates exit higher education institutions possessing the necessary information security skills, knowledge and understanding to enable them to perform their roles and responsibilities securely. It is hoped that this could enable computing graduates to become a stronger link in securing organisational information systems and related assets

    From flowers to palms: 40 years of policy for online learning

    Get PDF
    This year sees the 40th anniversary of the first policy paper regarding the use of computers in higher education in the United Kingdom. The publication of this paper represented the beginning of the field of learning technology research and practice in higher education. In the past 40 years, policy has at various points drawn from different communities and provided the roots for a diverse field of learning technology researchers and practitioners. This paper presents a review of learning technology-related policy over the past 40 years. The purpose of the review is to make sense of the current position in which the field finds itself, and to highlight lessons that can be learned from the implementation of previous policies. Conclusions drawn from the review of 40 years of learning technology policy suggest that there are few challenges that have not been faced before as well as a potential return to individual innovation

    A Curriculum Model Based on the SIGITE Guidelines

    Get PDF

    An Implementation of the IT Fundamentals Knowledge Area in an Introductory IT Course

    Get PDF
    The recently promulgated IT model curriculum contains IT fundamentals (ITF) as one of its knowledge areas. It is intended to give students a broad understanding of (1) the IT profession and the skills that students must develop to become successful IT professionals and (2) the academic discipline of IT and its relationship to other disciplines. The model curriculum recommends 33 lecture hours to complete the IT fundamentals knowledge. The model curriculum also recommends that the material relevant to the IT fundamentals knowledge area be offered early in the curriculum, for example in an Introduction to IT course; however, many institutions will have to include additional material in an introductory IT course. For example, the Introduction to IT course at Georgia Southern University is used to introduce students to the available second disciplines (an important part of the Georgia Southern IT curriculum aimed at providing students with in-depth knowledge of an IT application domain), some productivity tools, and SQL in addition to an introduction to the discipline of IT. For many programs there may be too much material in an introductory IT course. This paper describes how Georgia Southern University resolved this problem by describing the structure of the introductory course at Georgia Southern, its assessment methods, and the relationship between the course and the ITF knowledge area and how those aspects of the ITF knowledge area that are not covered in the introductory course are covered elsewhere in the program

    The Information Technology Model Curriculum

    Get PDF
    • ā€¦
    corecore