


default search action
SIGITE Conference 2024: El Paso, TX, USA
- Christian Servin, Olga Kosheleva:
The 25th Annual Conference on Information Technology Education, SIGITE 2024, El Paso, TX, USA, October 10-12, 2024. ACM 2024, ISBN 979-8-4007-1106-0
Session 1A: AI and IT Education 1
- Edward J. Glantz
, Joanne C. Peca
, Mahdi Nasereddin
, Sarah J. Stager
, Michael R. Bartolacci
:
Beyond the Code: The Role of Non-Traditional Sectors in Shaping Generative AI Innovations and Transforming Global Industries. 1-6 - Joy Buuri
, Samah S. Mansour
, Mostafa El-Said
, Xinli Wang
:
An Empirical Study Using Microsoft Azure Auto Machine Learning to Detect Zero-Day Attacks. 7-11 - He Zhang
, Jingyi Xie
, Chuhao Wu
, Jie Cai
, Chanmin Kim
, John M. Carroll
:
The Future of Learning: Large Language Models through the Lens of Students. 12-18 - Sagnik Dakshit
:
Faculty Perspectives on the Potential of RAG in Computer Science Higher Education. 19-24
Session 2A: Education Practices
- Ilenia Fronza
, Gennaro Iaccarino
, Sara Tosi
, Luis Corral
:
Designing Inclusive and Gender-Balanced Coding Camps: A Comprehensive Assessment Framework. 25-31 - Ammar Mehicevic
, Anca Doloc-Mihu
, Cindy Robertson
:
Teaching Algorithms and Growing STEM with Sphero. 32-36 - Anh Tang
, Julissa Valdez-Ramos
, Anca Doloc-Mihu
, Cindy Robertson
:
Space Mechanics: A Beginner's Guide to Programming Fundamentals. 37-42 - Matthew Perkins Coppola
, Beomjin Kim
, Michelle Parker
, Guoping Wang
, Thomas Bolinger
:
Examining the Differences in Three Computing Fields with High School Students. 43-48
Session 1B: AI and Education II
- Christian Servin
, Nadia V. Karichev
, Myshie Pagel
:
Unfolding Programming: How to Use AI Tools in Introductory Computing Courses. 49-55 - Volker Göhler
, Garima Yadav
:
Analyzing Concept Maps in Computer Science Education: An Unsupervised Learning Approach with Graph Neural Networks. 56-61 - Catherine I. Beaton
, Elissa Weeden
, Stephen J. Zilora
:
Instructional Approaches Complementing the Use of Generative Artificial Intelligence in Higher Education. 62-67 - Daniel Kim
, Jue Wu
:
Artificial Intelligence in Higher Education: Examining the AI Policy Landscape at U.S. Institutions. 68-73
Session 2B: IT Education: General
- Aviral Srivastava
, Edward J. Glantz
, Kartik Khurana
, Sarah J. Stager
:
Enhancing Revenue and Student Outcomes at Small Universities through Professional STEM Master's Programs. 74-78 - Michael Halper
:
Using Dependency Injection for the Singleton Design Pattern in Android Apps. 79-84 - Yong Zheng
:
A Comprehensive Analysis of ACM SIGITE 2003 - 2023 Publications Using LitStudy. 85-92 - Cara Tang
, Markus Geissler
, Pam Schmelz
, Christian Servin
, Cindy Tucker
:
Competencies with Bloom's for Computing. 93-98
Session 1C: Collaborations
- Christian Servin
, Myshie Pagel
, Steven E. Smith
:
A Model to Generate Credentials of Value in Computing: Towards Recognizing Authentic Regional Business/Industry Intersection with Emerging Computing Pathways. 99-104 - Brian G. Rodiles Delgado
, Alejandro Solano
, Christian Servin
, Deepak K. Tosh
:
Fostering Transparent Research Collaborations Between Two- and Four-Year Institutions in Industrial Cybersecurity Education. 105-110
Session 2C: Applications of Statistical Techniques
- Rex Perez Bringula
, Mideth B. Abisado
, Josie Calfoforo
, Armida Salazar
, Arjo Ladia
, Agnes Reyes
, Jiali He
:
Validity and Reliability of the Qualities of Online Programming Teacher Inventory. 111-116 - Hollis Greenberg
, Laurie Dringus
, Junping Sun
, Ling Wang
:
Popups, Credibility, and the Spread of Misinformation. 117-122
Panels
- Rajendra K. Raj
, Sandra Gorka
, Mihaela Sabin
, Christian Servin
:
AI, Security, and Society: Lessons From CS2023 For Information Technology Education. 123-124 - Deborah Boisvert
, Michael D. Harris
, Joyce Malyn-Smith
:
Building an Innovation Pathway for Data Careers. 125-128 - Ye Diana Wang
:
ChatGPT-Assisted ABET Accreditation for BSIT Programs. 129 - Opetunde Ibitoye
, Sunkanmi Oluwadare
, Hazem Said
:
Navigating the IT Talent Shortage: a Systematic Literature Review ofInformation Technology Development in the United States. 130-133 - Abdou Fall
, Saheed Popoola
:
Educators' Perspective on the role of Computational Technology in K-12 Education. 134-137 - Olga Kosheleva
, Vladik Kreinovich
:
Gifted and Talented: With Others? Separately? Mathematical Analysis of the Problem. 138-141 - Debasis Bhattacharya
, Una Bella
, Angelo Bella
:
Risks to Critical Infrastructure in Hawaii - A Small Business Perspective. 142 - Milly Namukasa
, Paola Spoletini
, Svetlana Peltsverger
:
Assessment and Instructor Engagement: A Student-Centric Perspectivefrom Gender and Minority Viewpoints. 143-144 - Elizabeth Mullins
, Adrian Portillo
, Kristalys Ruiz-Rohena
, Aritran Piplai
:
Enhancing classroom teaching with LLMs and RAG. 145-146 - Sahil Thorat
, Yong Zheng
, Vivian Jacob Varghese
, Anette Volkova
:
Designing a FAQ Chatbot to Enhance Faculty Support. 147-150 - Anca Doloc-Mihu
, Cindy Robertson
:
Tips and Tricks for Developing Successful Technology Projects for Introduction to Programming and Outreach. 151-152 - Ensaf Alhazeem
, Anas M. R. Alsobeh
, Bilal Al-Ahmad
:
Enhancing Software Engineering Education through AI: An Empirical Study of Tree-Based Machine Learning for Defect Prediction. 153-156 - Mubarak Banisakher
, Michelle Stewart
:
Bridging the Skills Gap: Development and Implementation of CloudComputing Programs in Higher Education. 157-160 - Brian Casio Iracheta
, Ivan Alonso
, Dan O. Padilla
, Emiliano Garcia
, Nacim Elias
:
Enhancing Introductory CS Courses Through Live Programming with Peer-Led Team Learning. 161-162 - Chola Chhetri
:
Exploring Large Language Model-Powered Pedagogical Approaches to Cybersecurity Education. 163-166 - David Esquivel
, Shawn Trousdale
, Mohammad Ariful Islam Khan
, Palvi Aggarwal
, Deepak K. Tosh
:
The Hacker Is Inside the Company! - Instance-Based Learning And Its Application to Defend Against Insider Hacking. 167-170 - Berenice Sotelo
, Kirsten Wieseman
, Saeid Tizpaz-Niari
:
Data Science in a Mathematics Classroom: Lessons on AI Fairness. 171-172

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.