Sciweavers

2648 search results - page 154 / 530
» Human Factors In Computer Security
Sort
View
CSE
2009
IEEE
15 years 11 months ago
Names of Our Lives
—Identifiers are an essential component of online communication. My research focuses on the ways that social, technical and policy factors affect people’s behavior with online...
Benjamin M. Gross
129
Voted
ITICSE
2006
ACM
15 years 11 months ago
Once she makes it, she is there: gender differences in computer science study
When you sit in a Computer Science lecture at any university in the western world, what are the chances that the person sitting next to you will be a woman? Furthermore, what are ...
Tamar Vilner, Ela Zur
123
Voted
ITICSE
2010
ACM
15 years 9 months ago
Experience report: CS1 for majors with media computation
Previous reports of a media computation approach to teaching programming have either focused on pre-CS1 courses or courses for non-majors. We report the adoption of a media comput...
Beth Simon, Päivi Kinnunen, Leo Porter, Dov Z...
135
Voted
SIGCSE
2008
ACM
119views Education» more  SIGCSE 2008»
15 years 4 months ago
Exploring studio-based instructional models for computing education
While the demand for college graduates with computing skills continues to rise, such skills no longer equate to mere programming skills. Modern day computing jobs demand design, c...
Christopher D. Hundhausen, N. Hari Narayanan, Mart...
SIGCSE
2006
ACM
130views Education» more  SIGCSE 2006»
15 years 11 months ago
Scavenger hunt: computer science retention through orientation
This paper describes Scavenger Hunt, a team-based orientation activity for incoming freshmen in the Department of Computer Science at the University of Illinois at Urbana-Champaig...
Jerry O. Talton, Daniel L. Peterson, Sam Kamin, De...