Conf Year | Article | Title | Authors |
2019 | View | CIS Cyber Scholars: An NSF Funded Initiative to Broaden Participation of Community College Transfer Students in Computer and IT Careers. |
Igoche, Paullet, Bromall
|
2019 | View | Democratizing Data Science Education using AutoML: Teaching with Dataiku DSS |
Igoche
|
2018 | View | Using Contextual Semantic Search to Gather Actionable Insights for Curriculum Development: A Research Proposal |
Igoche
|
2017 | View | Media versus Message: Choosing The ER Diagram To Teach ER Modeling
|
Wu, Igoche, Draus
|
2016 | View | How to Encourage Middle School Girls Interested in STEM+C Education: An Assessment of Current Status |
Mishra, Cellante, Igoche
|
2015 | View | Redesigning the Traditional Introductory Computer Course: A Pretest/Posttest Analysis |
Mishra, Cellante, Igoche, Kavanaugh
|
2024 | View | Digital Forensics in Action: A Case Study of
Tracing Cybercriminals Behind Job Offer Spear Phishing Scams in Academic Institutions
|
Ihekweazu, Adelowo, Aghado
|
2023 | View | Proposed Adoption of Virtual Reality Framework in Digital Forensics Curriculum |
Ihekweazu, Shashidhar, Ihekweazu
|
2023 | View | Proposed Adoption of Virtual Reality Framework in Digital Forensics Curriculum |
Ihekweazu, Shashidhar, Ihekweazu
|
2023 | View | The Use of Artificial Intelligence in Academic Dishonesty: Ethical Considerations |
Ihekweazu, Zhou, Adelowo
|
2022 | View | Adopting the DFORS-quiz app on Mobile Systems for Learning in Education with a focus on Digital Forensics. |
Ihekweazu, Lester, Zhou
|
2022 | View | Utilizing VR Cybersecurity Escape Rooms for Middle Schoolers to Break Poverty Cycles |
Lester, Dalat Ward, Ihekweazu
|
2015 | View | Cyber Security Day: Creating a Mock Cyber Competition Event to Increase Student Interest in Cyber Security |
Imboden, Martin, Woodward, Wood, Goodman
|
2024 | View | A Diffusion of Innovation-Driven Approach for Strategic Integration of Large Language Models in Education |
Hossain, Shahid, Imteaj
|
2023 | View | An Experiential Learning Approach to the Introduction to Business Course |
Wagner, Intindola
|
2020 | View | Plugin-based Tool for Secure Mobile Application Development |
Shahriar, Zhang, Valero, Sneha, Riad, Islam, Ahamed
|
2018 | View | An Examination of Project Context in Improving Computer Programming Pedagogy |
Iyer, Hassler, Dissanayake, Bedeley
|
2018 | View | Ethical Hacking Skills: Review of Pedagogical Approaches and Recommendation of Best Practices |
Hartley, Iyer, Taylor
|
2024 | View | A Comparison of Large Language Models for Oncology Clinical Text Summarization |
Izuchukwu , Wimmer, Rebman Jr.
|