default search action
ACM Inroads, Volume 5
Volume 5, Number 1, March 2014
- John Impagliazzo:
Editor's corner. 4
- Andrew D. McGettrick, Yan Timanovsky:
Digest of ACM educational activities. 6-10 - Curt M. White:
Spotlight. 12-16
- C. Dianne Martin:
Social networks and the ethics of hyperreality. 18-19 - Deepak Kumar:
Digital playgrounds for early computing education. 20-21 - Heikki Topi:
Building ethics into information systems education. 22-23 - Henry M. Walker:
Encouraging student preparation for class. 24-25 - Lauri Malmi:
Doctoral studies in computing education research - part 2. 26-27 - Yoav Yosef Yair:
Print vs. digital books in distance education. 28-29 - Lisa C. Kaczmarczyk:
We need to talk. 30-31 - Elizabeth K. Hawthorne:
CS2013 exemplar spotlight on two-year colleges. 31-34 - Peter B. Henderson, Allan M. Stavely:
Programming and mathematical thinking. 35-36 - David Ginat:
Longest sum modulo-3. 37-38 - Jeffrey L. Popyack:
Meeting the next generation of industry leaders. 38-40
- Diana L. Burley:
Cybersecurity education, part 1. 41 - Diana L. Burley, Eugene H. Spafford:
An interview with Gene Spafford on balancing breadth and depth in cybersecurity education. 42-46 - Daniel Manson, Ronald Pike:
The case for depth in cybersecurity education. 47-52 - David H. Tobey, Portia Pusey, Diana L. Burley:
Engaging learners in cybersecurity careers: lessons from the launch of the national cyber league. 53-56 - Barbara Endicott-Popovsky, Viatcheslav Popovsky:
Application of pedagogical fundamentals for the holistic development of cybersecurity professionals. 57-68
- Rosita Wachenchauzer:
The evolution of computer education in Latin America: the case of Argentina. 70-76
- John R. White:
Report on the first Heidelberg Laureate Forum. 78-79
- Susan S. Lukesh:
Girls and STEM. 80
Volume 5, Number 2, June 2014
- John Impagliazzo:
Editor's corner. 4
- Andrew D. McGettrick, Yan Timanovsky:
Digest of ACM educational activities. 6-10 - Curt M. White:
Spotlight. 12-14
- Alireza Ebrahimi:
Expressing programming algorithms with poetic language. 16-20
- Tony Clear:
Framing a research study. 22-23 - Heikki Topi:
Learning to think about broader implications of big data. 24-25 - Henry M. Walker:
College courses of varying credit. 26-28 - Lauri Malmi:
Reporting and research questions. 29-30 - Michal Armoni:
Spiral thinking: K-12 computer science education as part of holistic computing education. 31-33 - Yoav Yair:
Did you let a robot check my homework? 33-35 - Lisa C. Kaczmarczyk:
What I learned about pedagogy from taking a non-technical MOOC. 35-37 - Elizabeth K. Hawthorne:
Associate-degree IT2014: a call for course examples and curriculum champions. 37-39 - Jeffrey L. Popyack:
Prohacktivity, or one giant hack for mankind. 40-52
- Avi Cohen, Bruria Haberman, Dalit Stauber:
Local and global perspectives of education - thoughts about including computer science in international exams. 43-49 - Daniel P. Shoemaker:
The colloquium for information system security education (CISSE)-the adventure continues. 50-54
- Susan S. Lukesh:
Big data. 56
Volume 5, Number 3, September 2014
- John Impagliazzo:
Editor's corner. 4
- Andrew D. McGettrick, Yan Timanovsky:
Digest of ACM educational activities. 6-8 - Curt M. White:
Spotlight. 9-11
- Cameron Wilson:
With unprecedented computer science momentum, what's next? 12
- Jane Chu Prey, Yan Timanovsky, Jodi L. Tims, Stuart H. Zweben:
ACM NDC study: second annual study of non-doctoral-granting departments in computing. 14-26
- Deepak Kumar:
Disrupting the cultural capital of brogrammers. 28-29 - Heikki Topi:
MSIS curriculum revision is moving forward! 30-31 - Henry M. Walker:
Some strategies when teaching theory courses. 32-34 - Lauri Malmi:
Tools research-what is it? 34-35 - Yoav Yair:
I saw you cheating. 36-37 - Lisa C. Kaczmarczyk:
Bookending the computing curriculum is a good start but not enough. 38-39 - Peter B. Henderson:
Pre-college computing math. 40-41 - David Ginat:
No arithmetic progression. 42-43
- Raymond Greenlaw, Andrew Phillips, Allen S. Parrish:
Is it time for ABET cybersecurity criteria? 44-48 - Ming Zhang, Long Zhang:
Undergraduate IT education in China. 49-55
- Spreading computerization will change the developed world. 56-59
- Susan S. Lukesh:
The internet of things. 60
Volume 5, Number 4, December 2014
- John Impagliazzo:
Editor's corner. 4
- Stephen Seidman:
Computing: an emerging profession? 6-11
- Yan Timanovsky:
Digest of ACM educational activities. 12-16 - Curt M. White:
Spotlight. 17-20
- Cameron Wilson:
Hour of code: we can solve the diversity problem in computer science. 22
- Don Gotterbarn:
Computer insecurity: known and unknown unknowns things computers can't know. 24-25 - Tony Clear:
Supervision for critical thinking: challenges and strategies. 26-27 - Heikki Topi:
IS perspectives on PACE workshop on computing education research. 28-29 - Henry M. Walker:
Structuring student work. 30-33 - Lauri Malmi:
Theory - what is it for? 34-35 - Michal Armoni:
Continuity and consistency in computing education: the spectrum from middle school to undergraduate programs. 35-37 - Yoav Yair:
Open educational resources: reasons to be cheerful? 37-38 - Jeffrey L. Popyack:
The rite of spring: a national convention, programming contest and Abacus Award. 39-41
- Suzanne W. Dietrich:
A metaphor for understanding objects and classes in CS1. 42-43
- David S. Touretzky:
Teaching Kodu with physical manipulatives. 44-51
- Deepak Kumar:
Welcome. 52-53 - Michal Armoni, Judith Gal-Ezer:
Early computing education: why? what? when? who? 54-59 - Kiki Prottsman:
Computer science for the elementary classroom. 60-63 - Irene A. Lee, Fred G. Martin, Katie Apone:
Integrating computational thinking across the K-8 curriculum. 64-71 - Sayamindu Dasgupta, Mitchel Resnick:
Engaging novices in programming, experimenting, and learning with data. 72-75
- Heikki Topi:
Highlights of PACE workshop on computing education research. 76-78 - Elizabeth K. Hawthorne:
WiCyS annual conferences: 2014 and 2015: WiCyS.net. 79
- Susan S. Lukesh:
Coding and K-12 computer science. 80
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.