Abstract is missing.
- Ethics Assessed: An Interdisciplinary Effort to Develop Standards for Automated Learning Assessment in IT CoursesKayeleigh Sharp, Belle Woodward, Nancy Martin 0001. 1-6 [doi]
- Teaching Adversarial Machine Learning: Educating the Next Generation of Technical and Security ProfessionalsCollin Payne, Edward J. Glantz. 7-12 [doi]
- Interpretable Deep Learning for University Dropout PredictionMáté Baranyi, Marcell Nagy, Roland Molontay. 13-19 [doi]
- Understanding Students' Identification and Use of Patterns While Writing SQL QueriesZahra Hatami, Peter Wolcott. 20-25 [doi]
- Analytics Prevalent Undergraduate IT ProgramJai W. Kang, Qi Yu 0001, Edward P. Holden, Erik Golen, Michael McQuaid. 26-31 [doi]
- Benefits and Pitfalls of Jupyter Notebooks in the ClassroomJeremiah W. Johnson. 32-37 [doi]
- Understanding Barriers and Motivations of Non-Traditional Students Learning Programming in an Online CS1 CourseFarzana Rahman. 38-41 [doi]
- Blockchain-based Learning Credential Revision and Revocation MethodAye Mi San, Nopporn Chotikakamthorn, Chanboon Sathitwiriyawong. 42-45 [doi]
- An Initial Survey of Deaf and Hard-of-Hearing Student Use of a Composite Screen Solution Utilizing Web Conferencing SoftwareElissa Weeden, Sharon Mason. 46-49 [doi]
- The Adoption, Issues, and Challenges of Wearable Healthcare Technology for the ElderlyChi Zhang, Hossain Shahriar. 50-53 [doi]
- Agro-AI Education: Artificial Intelligence for Future FarmersDonovan Orn, Lian Duan, Yi Liang, Harvey P. Siy, Mahadevan Subramaniam. 54-57 [doi]
- Do You See What I See?: The Use of Visual Passwords for AuthenticationMarc J. Dupuis, Jaynie Shorb, James Walker, Fred B. Holt, Michael McIntosh. 58-61 [doi]
- In Pursuit of CS-based Educational Content Suitable for Broader AudiencesVictor Winter, Judith Monarrez Diaz-Kelsey. 62-67 [doi]
- Exploring Mobile Learning - Engaging Students where they arePaul J. A. van Vliet. 68-73 [doi]
- Observing the Impact of Online Outreach Versus Face to Face OutreachAnca Doloc-Mihu, Cindy Robertson. 74-80 [doi]
- Do Badges Increase Student Engagement and Motivation?Darina Dicheva, Rebecca Caldwell, Breonte Guy. 81-86 [doi]
- Gendered Performance Differences in Information Technology CoursesRebekah Michael, Hazem Said. 87-92 [doi]
- Evaluating Student Participation in Undergraduate Information Technology Programs in the U.SMihaela Sabin, Stuart Zweben, Barry M. Lunt, Rajendra K. Raj. 93-99 [doi]
- A Sprint-Based Approach to Teaching Computer ScienceBrian C. Ricks. 100-105 [doi]
- Successful Undergraduate-level Experiential Learning Projects: A Stakeholder PerspectiveMargeret Hall, April Goettle, Connor Carson, Jess Collicott, Kim Dietz, Kip Smith. 106-112 [doi]
- More Fun Than Ought to be Graded: Assuring Student Learning in Study Abroad ProgramsMargeret Hall, Ann L. Fruhling, Christian Haas 0002. 113-119 [doi]
- Leading with Curiosity, Passion and IntegritySteve Kaniewski. 120 [doi]
- A Profile of SIGITE/RIIT Authors, 2nd EdBarry M. Lunt, Dan Bogaard. 121-125 [doi]
- The Evolution of Computing Degrees: Tracking ABET Accredited Undergraduate Disciplines over TimeDerek Hansen, Aatish Neupane, C. Richard G. Helps. 126-131 [doi]
- SIGITE and SIGCSE Symposiums: A Comparative StudyYong Zheng. 132-137 [doi]
- An Academic Profile of IT Program Leadership in the U.SNancy Martin 0001. 138-142 [doi]
- Collaboration to Create an IT Bachelor's Degree: Bachelor of Applied Science in Web Design and DevelopmentScott Alan Dawson, Diane Nelson Roux. 143-148 [doi]
- An Interdisciplinary Collaboration Enhances Education in Both Disciplines and Generates Future OpportunitiesWei Jin, Ying Guo, David Marshall, Garrett Brown. 149-155 [doi]
- Debugging the Gender Gap: (Re-)entry Initiatives in Emerging Technologies for WomenElodie Billionniere, Farzana Rahman, Brandeis Marshall, Tami Forman. 156-157 [doi]
- Implementing the IT-Transfer2020 Curriculum Guidance for Two-Year IT Transfer ProgramsMarkus Geissler, Mihaela Sabin, Cara Tang. 158-161 [doi]
- The Study of the Classic Producer-consumer Problem in a Series of IT CoursesYing Luo, Xianping Wang. 162-167 [doi]
- A Theory-Based Course Development Framework: A Case StudyZhigang Li, Meng Han, Xin Shirley Tian, Jing (Selena) He. 168-173 [doi]
- On Validity of Sentiment Analysis Scores and Development of Classification Model for Student-Lecturer Comments Using Weight-based Approach and Deep LearningOchilbek Rakhmanov. 174-179 [doi]
- Mango Quality Grading using Deep Learning Technique: Perspectives from Agriculture and Food IndustryVarsha Bhole, Arun Kumar. 180-186 [doi]
- A Multi-Dimensional Assessment Model and Its Application in E-learning Courses of Computer ScienceJiwen Luo, Feng Lu, Tao Wang. 187-193 [doi]
- Teaching Flooding Attack to the SDN Data Plane with POGILHanan Alshaher, Xiaohong Yuan, Sajad Khorsandroo. 194-199 [doi]
- Open Challenges as a Way to Engage Students: an Experience Report from Three Undergraduate CoursesGiovanni Vincenti. 200-205 [doi]
- Improving Critical Thinking in Software Development via Interdisciplinary Projects at a Most Diverse CollegeCengiz Günay, Anca Doloc-Mihu, Rahaf Barakat, Thomas Gluick, Catherine A. Moore. 206-212 [doi]
- Outreach, Inreach, and The Age of Reason: Technology Education for a New Age of LearningPatrick Seeling. 213 [doi]
- Technical Communication Course: What do we want? What do students need?Diane C. Shichtman. 214 [doi]
- Updating OER Materials in IT Courses: Sharing the Fun and Fulfillment with Students while Sending the Workload to AutomationRichard Halstead-Nussloch. 215 [doi]
- Smart City Concepts Cloud-Based Learning Platform for Undergraduate IT StudentsPaul-Marie Moulema Douala, Sriharsha Mallapuram. 216 [doi]
- Fill Students' Knowledge Gap by Recommending Remedial Learning MaterialsYong Zheng. 217 [doi]
- Challenges and Strategies for Online Teaching in Information Technology and Other Computing ProgramsNick Rahimi, Nancy L. Martin. 218-222 [doi]
- A Case Study in Comparative Speech-to-Text Libraries for Use in Transcript Generation for Online Education RecordingsPablo Ángel Álvarez Fernández, Jeremy R. Hajek. 223-228 [doi]
- A Novel Approach for Embedding and Traversing Problems in Serious GamesAbhishek Parakh, Mahadevan Subramaniam, Parvathi Chundi, Elliott Ostler. 229-235 [doi]
- Interactive Visualizations to Introduce Data Science for High School StudentsSiddharth Chittora, Anna Baynes. 236-241 [doi]
- P12 Computing in Italy, England and Alabama, USAFrancesco Maiorana, Andrew Paul Csizmadia, Gretchen M. Richards. 242-247 [doi]
- Evaluating the Effectiveness of a Coding Camp through the Analysis of a Follow-up ProjectIlenia Fronza, Luis Corral, Claus Pahl, Gennaro Iaccarino. 248-253 [doi]
- Building Machines that Empower Humans: How a Purpose Guided my Career rather than a PlanMaria Telleria. 254 [doi]
- Exploring the Use of XPath Queries for Automated Assessment of Student Web Development ProjectsRussell Thackston. 255-259 [doi]
- Assistance of Student by Web Services based on AnnotationsOmar Mazhoud, Anis Kalboussi, Ahmed Hadj Kacem. 260-265 [doi]
- Affordable Proctoring Method for Ad-hoc Off-campus ExamsNopporn Chotikakamthorn, Supawan Tassanaprasert. 266-272 [doi]
- USB Linux: An IT Lab Instruction Tool During COVID-19Jeremy Diederich, Xianping Wang, Niharika Dayyala, Sundeep Inti, Ying Luo. 273-278 [doi]
- The New Post-Pandemic Normal of College TraditionsEdward J. Glantz, Chris Gamrat. 279-284 [doi]
- Using the Pandemic as a Case Study: Teaching Social and Ethical IssuesDiane C. Shichtman. 285-290 [doi]
- Panel: What COVID-19 is Teaching Professors: Pandemic-Level Changes in our ClassroomsHollis Greenberg, Daniel S. Bogaard, C. Derrick Huang, Tim Preuss, Cara Tang. 291-292 [doi]
- Learn Regex: A Novel Tool for Learning Regular ExpressionsJulie M. Smith. 293 [doi]
- Switching to Stay Home Instruction: Impacts of the Coronavirus Pandemic on Learner Performance for an Introductory Computer Science CoursePatrick Seeling. 294 [doi]
- A Comparison of Tools and Libraries for In-Class Face Detection and Emotion RecognitionAlejandro Susillo Ridao, Yong Zheng. 295 [doi]
- Cultivating Next Generation Emerging Technology Workforce through Academia-Industry PartnershipsFarzana Rahman, Elodie Billionniere. 296 [doi]
- Underrepresented Students' Confidence in Information Technology Content AreasAlan Franklin, Viloshanakumaran Veeramani, Malinda Suprise, Belle Woodward. 297 [doi]
- ARGOS: A Platform for Student EngagementJuan Pablo Soto Medico, Karl-Heinz Gilbert-Wason, William Hyland, John Manlucu, Osman Martinez, Larysa Paliashchuk, Eric Ra, Giovanni Vincenti. 298 [doi]
- Teaching from Home: Network Support PerspectivesJianping Pan 0001. 299 [doi]
- Managing Controlled Unclassified Information (CUI) in Research InstitutionsBaijian Yang, Carolyn Ellis, Preston Smith. 300 [doi]
- Online Education and theDavid Drohan, Eamonn deLeastar, Patrick Seeling. 301 [doi]
- An Examination of Regional Tech Meetups Found on Meetup.comRussell E. McMahon. 302 [doi]
- Toward Designing an Intervention for Cyber-bullyingShubhangi S. Lal, Annu Sible Prabhakar. 303 [doi]
- Perceptions, Effectiveness, and Impact of a Dual Enrollment Cybersecurity CourseSandra Gorka, Alicia McNett, Jacob R. Miller, Bradley M. Webb. 304 [doi]
- QWiki: A Collaborative Space to Mine Feedback for MOOCsSimran Setia, S. R. S. Iyengar, Abhishek Agarwal. 305 [doi]
- Enhancing CSS Instruction with Objective TypographyKarl Stolley. 306 [doi]
- Machine-To-Machine Ad-Hoc Networking with a Redundant 4G LTE Gateway Using BATMAN-AdvWilliam Crowe, Tae (Tom) Oh. 307 [doi]
- Lessons Learned from Teaching Cybersecurity Courses During Covid-19Yan Bai, Chunming Gao, Bryan S. Goda. 308-313 [doi]
- "I Lost Track of Things": Student Experiences of Remote Learning in the Covid-19 PandemicChola Chhetri. 314-319 [doi]
- ConductingMarc J. Dupuis, Karen Renaud. 320-323 [doi]
- Teaching Web-Attacks on a Raspberry Pi Cyber RangeSang-Keun Oh, Nathaniel Stickney, Daniel Hawthorne, Suzanne J. Matthews. 324-329 [doi]
- Developing an Undergraduate Course Curriculum for Ethical HackingYang Wang, Margaret McCoey, Qian Hu. 330-335 [doi]
- Cross-Boundary Cyber Education DesignEdward J. Glantz, Michael R. Bartolacci, Mahdi Nasereddin, David Joseph Fusco. 336-341 [doi]
- Your Web TA: Automated Assessment of Student Web Development ProjectsRussell Thackston. 342-343 [doi]
- An Interdisciplinary Approach for Teaching Artificial Intelligence to Computer Science StudentsAnoop Mishra, Harvey P. Siy. 344 [doi]
- A Novel Framework for Collaborated IT Project with the Consideration of Data Security and PrivacyMeng Han, Lei Li, Ying Xie. 345 [doi]
- AI-Driven Contextual Virtual Teaching Assistant Using RASAGaurav Shekhar, Rhea D'Souza, Kevin Fernandes. 346 [doi]
- Clickthrough Testing for Real-World Phishing SimulationsMarc J. Dupuis, Samantha Smith. 347 [doi]
- Ride-Share Analysis in Boston City: A Comparison Between Uber and LyftVih Dogo, Khushboo Garg, Yong Zheng. 348 [doi]
- Predictive Staffing Model for Transit SecurityYong Zheng, Shubham Madke, Vih Modeste Dogo, Yash Agrawal. 349 [doi]
- Filling an Educational Void with Spatial Thinking in the Online Age of PandemicsKate Sherwin, Victor Winter. 350 [doi]
- Promoting Teaching Practices in IT Higher EducationSanaa Kaddoura, Rima Grati. 351 [doi]
- Student-To-Workforce Pipeline: Are Your Faculties' Future Cloudy?Elodie Billionniere, Lawrence Meyer. 352 [doi]
- Early Information Technology Program High School Teachers' Training and Continual Professional DevelopmentJen Fritz, Selena Ramanayake, Tracy Collins. 353 [doi]
- Systemic Change in IT Education: Frameworks and Stories from the FieldLecia Barker. 354 [doi]
- Instructor led training and Certification - ITIL V4 FoundationGaurav Shekhar. 355 [doi]
- New ABET Information Technology Program Criteria: The 5 W's QuestionsJim Leone, Sandra Gorka, Scott Murray, Mihaela Sabin. 356-357 [doi]
- ITEval: A Framework for Information Technology EvaluationXinli Wang, Mostafa El-Said, Paul M. Leidig. 358-364 [doi]
- A Framework for Applying Educational Psychology Principles to the Design and Assessment of Learning TechnologySaríah López-Fierro, Andrea Vásquez. 365-370 [doi]
- Continuous Planning and Forecasting Framework (CPFF) for Agile Project Management: Overcoming theThomas Dilger, Christian Ploder, Wolfgang Haas, Pascal Schöttle, Reinhard Bernsteiner. 371-377 [doi]
- Improving Student Success through an Articulation Program in Software EngineeringJames Philips, Nathanael Fenwick, Storm Davis, Nasseh Tabrizi. 378-383 [doi]
- Four Heads Are Better Than One: Using Team-Based Learning to Learn Database TechnologyAlanah Mitchell. 384-389 [doi]
- The Necessity of Interdisciplinary Software Development for Building Viable Research Platforms: Case Study in Automated Drug Delivery in DiabetesJeremy Hajek, Mudassir M. Rashid, Mert Sevil, Ali Cinar, Pablo Ángel Álvarez Fernández, Dhiraj Jain. 390-396 [doi]
- Integrated Cybersecurity Plus Robotics Lesson Using NAOAnkur Chattopadhyay, Mohammad Q. Azhar, Thomas Everson, Robert Ruska Jr.. 397-402 [doi]
- CryptoTutor: Teaching Secure Coding Practices through Misuse Pattern DetectionLarry Singleton, Rui Zhao, Myoungkyu Song, Harvey P. Siy. 403-408 [doi]
- A Cybersecurity Course for EveryoneSandra Gorka, Alicia McNett, Jacob R. Miller, Bradley M. Webb. 409-412 [doi]
- A NERD DOGMA: Introducing CTF to Non-expert AudienceGabriele Costa, Martina Lualdi, Marina Ribaudo, Andrea Valenza. 413-418 [doi]
- DomainPKI: Domain Aware Certificate ManagementXinli Wang, Mostafa El-Said. 419-425 [doi]
- The Kessel Run - A Gamification of Visual, Spatial, and Computational ThinkingVictor Winter, Kate Sherwin. 426-427 [doi]
- Using Creative Problem Solving and Applied Improvisation Techniques to Improve Soft SkillsRussell E. McMahon. 428-429 [doi]