References
- Anderson, L. W. (2005). Objectives, evaluation, and the improvement of education. Studies in Educational Evaluation, 31(2–3), 102–113. doi:10.1016/j.stueduc.2005.05.004
- Chan, A., & Chung, W. (2015, May). Teaching program design and implementation in a digital forensics context. In Proceedings of The 2015 NSF Workshop on Curricular Development for Computing in Context (pp. 4). ACM.
- Chung, W. (2015, May). Business analytics in context: Evaluating new curricular modules in an undergraduate statistics course. In Proceedings of The 2015 NSF Workshop on Curricular Development for Computing in Context (p. 3). ACM.
- Czaja, S. J., Charness, N., Fisk, A. D., Hertzog, C., Nair, S. N., Rogers, W. A., & Sharit, J. (2006). Factors predicting the use of technology: Findings from the center for research and education on aging and technology enhancement (CREATE). Psychology and Aging, 21(2), 333–352. doi:10.1037/0882-7974.21.2.333
- Hill, C., Corbett, C., & St Rose, A. (2010). Why so few? Women in science, technology, engineering, and mathematics. 1111 Sixteenth Street NW, Washington, DC 20036: American Association of University Women.
- Kantor, P., Muresan, G., Roberts, F., Zeng, D., Wang, F. Y., Chen, H., & Merkle, R. (2005). Intelligence and Security Informatics: IEEE International Conference on Intelligence and Security Informatics. ISI, 19–20.
- Knight, M. G., Dixon, I. R., Norton, N. E. L., & Bentley, C. (2004). Extending learning communities: New technologies, multiple literacies, and culture blind pedagogies. The Urban Review, 36(2), 101–118. doi:10.1007/s11256-004-0615-1
- Lou, S. J., Guo, Y. C., Zhu, Y. Z., Shih, R. C., & Dzan, W. Y. (2011). Applying computer-assisted musical instruction to music appreciation course: An example with Chinese musical instruments. Turkish Online Journal of Educational Technology-TOJET, 10(1), 45–57.
- McCoid, S., Freeman, J., Magerko, B., Michaud, C., Jenkins, T., Mcklin, T., & Kan, H. (2013). EarSketch: An integrated approach to teaching introductory computer music. Organised Sound, 18, 146–160. doi:10.1017/S135577181300006X
- Nair, S. N., Czaja, S. J., & Sharit, J. (2007). A multilevel modeling approach to examining individual differences in skill acquisition for a computer-based task. The Journals of Gerontology Series B: Psychological Sciences and Social Sciences, 62(Special Issue 1), 85–96. doi:10.1093/geronb/62.special_issue_1.85
- Ownby, R. L., Czaja, S. J., Loewenstein, D., & Rubert, M. (2008). Cognitive abilities that predict success in a computer-based training program. The Gerontologist, 48(2), 170–180. doi:10.1093/geront/48.2.170
- Plante, D. R. (2015, May). Computing in context: Teaching intelligence and security informatics in computer science courses. In Proceedings of The 2015 NSF Workshop on Curricular Development for Computing in Context (p. 2). ACM.
- Shackelford, S. J., Fort, T. L., & Prenkert, J. D. (2014). Sustainable cybersecurity: Applying lessons from the green movement to managing cyber attacks (p. 2324620). Available at, SSRN.
- The 2015 NSF Workshop on Curricular Development for Computing in Context. Retrieved from http://pegasus.cc.ucf.edu/~cyber/cic/ws3.php, http://pegasus.cc.ucf.edu/~cyber/cic/prog.php.
- Tobias, E. S. (2013). Toward convergence: Adapting music education to contemporary society and participatory culture. Music Educators Journal, 99(4), 29–36. doi:10.1177/0027432113483318
- Trippe, D. M., Moriarty, K. O., Russell, T. L., Carretta, T. R., & Beatty, A. S. (2014). Development of a cyber/information technology knowledge test for military enlisted technical training qualification. Military Psychology, 26(3), 182–198. doi:10.1037/mil0000042