scholarly journals Computer Science Technology-Cyber Security Option

2021 ◽  
Author(s):  
Asad Yousuf ◽  
Alberto De La Cruz ◽  
Frederick Sheldon
2021 ◽  
Vol 30 (2) ◽  
pp. 9-21
Author(s):  
A. I. Chuchalin

It is proposed to adapt the new version of the internationally recognized standards for engineering education the Core CDIO Standards 3.0 to the programs of basic higher education in the field of technology, natural and applied sciences, as well as mathematics and computer science in the context of the evolution of STEM. The adaptation of the CDIO standards to STEM higher education creates incentives and contributes to the systematic training of specialists of different professions for coordinated teamwork in the development of high-tech products, as well as in the provision of comprehensive STEM services. Optional CDIO Standards are analyzed, which can be used selectively in STEM higher education. Adaptation of the CDIO-FCDI-FFCD triad to undergraduate, graduate and postgraduate studies in the field of science, technology, engineering and mathematics is considered as a mean for improving the system of three-cycle STEM higher education.


2018 ◽  
pp. 977-994
Author(s):  
Margarita Levin Jaitner ◽  
Áine MacDermott

Academia plays an important role in shaping a country's cyber readiness. In the past years, nations have started investing in new cyber-related programs at colleges and universities. This also includes promoting academic exchange with partner countries, as well as putting effort into improved cooperation between industries and scholars in the area of cyber. In many cases the efforts focus largely on computer science and closely related branches of science. However, the very nature of the cyberspace as both a continuation and a reflection of the physical world require a broader perspective on academic assets required to create and sustain sound cyber defines capabilities. Acknowledging this premise, this paper sets out to map branches of science that significantly contribute to the domain known as ‘cyber' and searches for new aspects for further development.


Author(s):  
Bernhard Thalheim

AbstractModels are a universal instrument in science, technology, and daily life. They function as instruments in almost every scenario. Any human activity can be (and is) supported by models, e.g. reason, explain, design, act, predict, explore, communicate, collaborate, interact, orient, direct, guide, socialises, perceive, reflect, develop, making sense, teach, learn, imagine, etc. This universal suitability is also the basis for a wide use of models and modelling in Computer Science and Engineering. We claim that models form the fourth dimension in Computer Science. This paper sketches and systematises the main ingredients of the study model and modelling.


2012 ◽  

CACIC’11 was the seventeenth Congress in the CACIC series. It was organized by the School of Computer Science of the University of La Plata. The Congress included 11 Workshops with 148 accepted papers, 3 main Conference, 4 invited tutorials, different meetings related with Computer Science Education (Professors, PhD students, Curricula) and an International School with 5 courses. (http://www.cacic2011.edu.ar/). CACIC 2011 was organized following the traditional Congress format, with 11 Workshops covering a diversity of dimensions of Computer Science Research. Each topic was supervised by a committee of three chairs of different Universities. The call for papers attracted a total of 281 submissions. An average of 2.5 review reports were collected for each paper, for a grand total of 702 review reports that involved about 400 different reviewers. A total of 148 full papers, involving 393 authors and 77 Universities, were accepted and 25 of them were selected for this book.


2016 ◽  

CACIC’15 was the 21thCongress in the CACIC series. It was organized by the School of Technology at the UNNOBA (North-West of Buenos Aires National University) in Junín, Buenos Aires. The Congress included 13 Workshops with 131 accepted papers, 4 Conferences, 2 invited tutorials, different meetings related with Computer Science Education (Professors, PhD students, Curricula) and an International School with 6 courses. CACIC 2015 was organized following the traditional Congress format, with 13 Workshops covering a diversity of dimensions of Computer Science Research. Each topic was supervised by a committee of 3-5 chairs of different Universities. The call for papers attracted a total of 202 submissions. An average of 2.5 review reports werecollected for each paper, for a grand total of 495 review reports that involved about 191 different reviewers. A total of 131 full papers, involving 404 authors and 75 Universities, were accepted and 24 of them were selected for this book.


2017 ◽  
Vol 15 (1) ◽  
pp. 19 ◽  
Author(s):  
Stephanie C. Prato

At the Fayetteville Free Library (FFL), we are working to develop a comprehensive plan for supporting computer science education and coding for every age through the public library’s informal learning platform.We introduce young children to programming logic, we teach elementary and middle school children coding languages, and we support adults in skill building and career shifts. In January 2016, President Obama announced the “Computer Science for All” initiative, which identified STEAM (science, technology, engineering, and math) learning and computer science as national priorities for all age groups.


10.28945/2292 ◽  
2015 ◽  
Vol 11 ◽  
pp. 123-147 ◽  
Author(s):  
Shlomi Boutnaru ◽  
Arnon Hershkovitz

In recent years, schools (as well as universities) have added cyber security to their computer science curricula. This topic is still new for most of the current teachers, who would normally have a standard computer science background. Therefore the teachers are trained and then teaching their students what they have just learned. In order to explore differences in both populations’ learning, we compared measures of software quality and security between high-school teachers and students. We collected 109 source files, written in Python by 18 teachers and 31 students, and engineered 32 features, based on common standards for software quality (PEP 8) and security (derived from CERT Secure Coding Standards). We use a multi-view, data-driven approach, by (a) using hierarchical clustering to bottom-up partition the population into groups based on their code-related features and (b) building a decision tree model that predicts whether a student or a teacher wrote a given code (resulting with a LOOCV kappa of 0.751). Overall, our findings suggest that the teachers’ codes have a better quality than the students’ – with a sub-group of the teachers, mostly males, demonstrate better coding than their peers and the students – and that the students’ codes are slightly better secured than the teachers’ codes (although both populations show very low security levels). The findings imply that teachers might benefit from their prior knowledge and experience, but also emphasize the lack of continuous involvement of some of the teachers with code-writing. Therefore, findings shed light on computer science teachers as lifelong learners. Findings also highlight the difference between quality and security in today’s programming paradigms. Implications for these findings are discussed.


Sign in / Sign up

Export Citation Format

Share Document