38
Views
0
CrossRef citations to date
0
Altmetric
Book Review/Panel Review

Proceedings of The 2015 NSF Workshop on Curricular Development for Computing in Context

New York, NY, ACM, 2015, 28 pp., ISBN: 978-1-4503-3597-3

, , &

References

  • Anderson, L. W. (2005). Objectives, evaluation, and the improvement of education. Studies in Educational Evaluation, 31(2–3), 102–113. doi:10.1016/j.stueduc.2005.05.004
  • Chan, A., & Chung, W. (2015, May). Teaching program design and implementation in a digital forensics context. In Proceedings of The 2015 NSF Workshop on Curricular Development for Computing in Context (pp. 4). ACM.
  • Chung, W. (2015, May). Business analytics in context: Evaluating new curricular modules in an undergraduate statistics course. In Proceedings of The 2015 NSF Workshop on Curricular Development for Computing in Context (p. 3). ACM.
  • Czaja, S. J., Charness, N., Fisk, A. D., Hertzog, C., Nair, S. N., Rogers, W. A., & Sharit, J. (2006). Factors predicting the use of technology: Findings from the center for research and education on aging and technology enhancement (CREATE). Psychology and Aging, 21(2), 333–352. doi:10.1037/0882-7974.21.2.333
  • Hill, C., Corbett, C., & St Rose, A. (2010). Why so few? Women in science, technology, engineering, and mathematics. 1111 Sixteenth Street NW, Washington, DC 20036: American Association of University Women.
  • Kantor, P., Muresan, G., Roberts, F., Zeng, D., Wang, F. Y., Chen, H., & Merkle, R. (2005). Intelligence and Security Informatics: IEEE International Conference on Intelligence and Security Informatics. ISI, 19–20.
  • Knight, M. G., Dixon, I. R., Norton, N. E. L., & Bentley, C. (2004). Extending learning communities: New technologies, multiple literacies, and culture blind pedagogies. The Urban Review, 36(2), 101–118. doi:10.1007/s11256-004-0615-1
  • Lou, S. J., Guo, Y. C., Zhu, Y. Z., Shih, R. C., & Dzan, W. Y. (2011). Applying computer-assisted musical instruction to music appreciation course: An example with Chinese musical instruments. Turkish Online Journal of Educational Technology-TOJET, 10(1), 45–57.
  • McCoid, S., Freeman, J., Magerko, B., Michaud, C., Jenkins, T., Mcklin, T., & Kan, H. (2013). EarSketch: An integrated approach to teaching introductory computer music. Organised Sound, 18, 146–160. doi:10.1017/S135577181300006X
  • Nair, S. N., Czaja, S. J., & Sharit, J. (2007). A multilevel modeling approach to examining individual differences in skill acquisition for a computer-based task. The Journals of Gerontology Series B: Psychological Sciences and Social Sciences, 62(Special Issue 1), 85–96. doi:10.1093/geronb/62.special_issue_1.85
  • Ownby, R. L., Czaja, S. J., Loewenstein, D., & Rubert, M. (2008). Cognitive abilities that predict success in a computer-based training program. The Gerontologist, 48(2), 170–180. doi:10.1093/geront/48.2.170
  • Plante, D. R. (2015, May). Computing in context: Teaching intelligence and security informatics in computer science courses. In Proceedings of The 2015 NSF Workshop on Curricular Development for Computing in Context (p. 2). ACM.
  • Shackelford, S. J., Fort, T. L., & Prenkert, J. D. (2014). Sustainable cybersecurity: Applying lessons from the green movement to managing cyber attacks (p. 2324620). Available at, SSRN.
  • The 2015 NSF Workshop on Curricular Development for Computing in Context. Retrieved from http://pegasus.cc.ucf.edu/~cyber/cic/ws3.php, http://pegasus.cc.ucf.edu/~cyber/cic/prog.php.
  • Tobias, E. S. (2013). Toward convergence: Adapting music education to contemporary society and participatory culture. Music Educators Journal, 99(4), 29–36. doi:10.1177/0027432113483318
  • Trippe, D. M., Moriarty, K. O., Russell, T. L., Carretta, T. R., & Beatty, A. S. (2014). Development of a cyber/information technology knowledge test for military enlisted technical training qualification. Military Psychology, 26(3), 182–198. doi:10.1037/mil0000042

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.