41,624 research outputs found

    Introductory programming: a systematic literature review

    Get PDF
    As computing becomes a mainstream discipline embedded in the school curriculum and acts as an enabler for an increasing range of academic disciplines in higher education, the literature on introductory programming is growing. Although there have been several reviews that focus on specific aspects of introductory programming, there has been no broad overview of the literature exploring recent trends across the breadth of introductory programming. This paper is the report of an ITiCSE working group that conducted a systematic review in order to gain an overview of the introductory programming literature. Partitioning the literature into papers addressing the student, teaching, the curriculum, and assessment, we explore trends, highlight advances in knowledge over the past 15 years, and indicate possible directions for future research

    To take or not to take the laptop or tablet to classes, that is the question

    Get PDF
    In recent decades, so-called mobile learning or m-learning has become a new paradigm in education as a consequence of technological advances and the widespread use of mobile devices to access information and for communication. In this context, this paper analyzes different profiles depending on students’ preferences for taking mobile devices (specifically tablets and/or laptops) to economics classes at the University of Seville (Spain). A survey-based field study of a sample of 412 students and the application of bivariate probit models show a low level of mobile device integration in teaching (devices taken to class by only 29.8% of respondents) with a slight predominance of laptops. The results also show differences between users of the two types of devices. Students who take their laptops to class usually live at home with their family, have already used them in pre-university levels, and are concerned about recharging their devices in class. However, although users who take their tablets to class also live with their parents, they are much more active on social network sites and more concerned about the quality of the internet connection. These findings enable the design of strategies to encourage students to attend class with their own mobile devices

    Cognitive and affective perspectives on immersive technology in education

    Get PDF
    This research explains the rationale behind the utilization of mobile learning technologies. It involves a qualitative study among children to better understand their opinions and perceptions toward the use of educational applications (apps) that are available on their mobile devices, including smartphones and tablets. The researchers organized semi-structured, face-to-face interview sessions with primary school students who were using mobile technologies at their primary school. The students reported that their engagement with the educational apps has improved their competencies. They acquired relational and communicative skills as they collaborated in teams. On the other hand, there were a few students who were not perceiving the usefulness and the ease of use of the educational apps on their mobile device. This study indicates that the research participants had different skillsets as they exhibited different learning abilities. In conclusion, this contribution opens-up avenues for future research in this promising field of study.peer-reviewe

    Bridging the gap between digital libraries and e-learning

    Get PDF
    Digital Libraries (DL) are offering access to a vast amount of digital content, relevant to practically all domains of human knowledge, which makes it suitable to enhance teaching and learning. Based on a systematic literature review, this article provides an overview and a gap analysis of educational use of DLs.The research work presented in this paper is partially supported by the FP7 Grant 316087 AComIn ”Advanced Computing for Innovation”, funded by the European Commission in the FP7 Capacity Programme in 2012-2016.peer-reviewe

    Microservice Transition and its Granularity Problem: A Systematic Mapping Study

    Get PDF
    Microservices have gained wide recognition and acceptance in software industries as an emerging architectural style for autonomic, scalable, and more reliable computing. The transition to microservices has been highly motivated by the need for better alignment of technical design decisions with improving value potentials of architectures. Despite microservices' popularity, research still lacks disciplined understanding of transition and consensus on the principles and activities underlying "micro-ing" architectures. In this paper, we report on a systematic mapping study that consolidates various views, approaches and activities that commonly assist in the transition to microservices. The study aims to provide a better understanding of the transition; it also contributes a working definition of the transition and technical activities underlying it. We term the transition and technical activities leading to microservice architectures as microservitization. We then shed light on a fundamental problem of microservitization: microservice granularity and reasoning about its adaptation as first-class entities. This study reviews state-of-the-art and -practice related to reasoning about microservice granularity; it reviews modelling approaches, aspects considered, guidelines and processes used to reason about microservice granularity. This study identifies opportunities for future research and development related to reasoning about microservice granularity.Comment: 36 pages including references, 6 figures, and 3 table

    Research Trends in the Use of Mobile Learning in Mathematics

    Get PDF
    The use of mobile learning in education is growing at an exponential rate. To best understand how mobile learning is being used, it is crucial to gain a collective understanding of the research that has taken place. This research was a systematic review of 36 studies in mobile learning in mathematics from the year 2000 onward. Eight new findings emerged: (1) The primary purpose of most studies was to focus on evaluating mobile learning. (2) Case studies and experimental design were the main research methods. (3) Most studies report positive learning outcomes; (4) Mobile phones were the mobile device used most often. (5) Elementary school settings were the most common research context. (6) The majority of researchers did not identify a specific mathematical concept being studied. (7) The majority of the studies took place in formal educational contexts; and (8) research on mobile learning in mathematics is geographically diverse

    Research Trends in the Use of Mobile Learning in Mathematics

    Get PDF
    The use of mobile learning in education is growing at an exponential rate. To best understand how mobile learning is being used, it is crucial to gain a collective understanding of the research that has taken place. This research was a systematic review of 36 studies in mobile learning in mathematics from the year 2000 onward. Eight new findings emerged: (1) The primary purpose of most studies was to focus on evaluating mobile learning. (2) Case studies and experimental design were the main research methods. (3) Most studies report positive learning outcomes; (4) Mobile phones were the mobile device used most often. (5) Elementary school settings were the most common research context. (6) The majority of researchers did not identify a specific mathematical concept being studied. (7) The majority of the studies took place in formal educational contexts; and (8) research on mobile learning in mathematics is geographically diverse

    How to make privacy policies both GDPR-compliant and usable

    Get PDF
    It is important for organisations to ensure that their privacy policies are General Data Protection Regulation (GDPR) compliant, and this has to be done by the May 2018 deadline. However, it is also important for these policies to be designed with the needs of the human recipient in mind. We carried out an investigation to find out how best to achieve this.We commenced by synthesising the GDPR requirements into a checklist-type format. We then derived a list of usability design guidelines for privacy notifications from the research literature. We augmented the recommendations with other findings reported in the research literature, in order to confirm the guidelines. We conclude by providing a usable and GDPR-compliant privacy policy template for the benefit of policy writers

    Refining the PoinTER “human firewall” pentesting framework

    Get PDF
    PurposePenetration tests have become a valuable tool in the cyber security defence strategy, in terms of detecting vulnerabilities. Although penetration testing has traditionally focused on technical aspects, the field has started to realise the importance of the human in the organisation, and the need to ensure that humans are resistant to cyber-attacks. To achieve this, some organisations “pentest” their employees, testing their resilience and ability to detect and repel human-targeted attacks. In a previous paper we reported on PoinTER (Prepare TEst Remediate), a human pentesting framework, tailored to the needs of SMEs. In this paper, we propose improvements to refine our framework. The improvements are based on a derived set of ethical principles that have been subjected to ethical scrutiny.MethodologyWe conducted a systematic literature review of academic research, a review of actual hacker techniques, industry recommendations and official body advice related to social engineering techniques. To meet our requirements to have an ethical human pentesting framework, we compiled a list of ethical principles from the research literature which we used to filter out techniques deemed unethical.FindingsDrawing on social engineering techniques from academic research, reported by the hacker community, industry recommendations and official body advice and subjecting each technique to ethical inspection, using a comprehensive list of ethical principles, we propose the refined GDPR compliant and privacy respecting PoinTER Framework. The list of ethical principles, we suggest, could also inform ethical technical pentests.OriginalityPrevious work has considered penetration testing humans, but few have produced a comprehensive framework such as PoinTER. PoinTER has been rigorously derived from multiple sources and ethically scrutinised through inspection, using a comprehensive list of ethical principles derived from the research literature
    • 

    corecore