Updated: 1 hour 38 min ago
Object-Oriented Analysis and Design (OOAD) courses enable students to establish a requirements model of an application, successively transform those requirements into logical design models, and then transform the logical models into physical design models. However, students attending OOAD courses typically encounter difficulties in the transition. Model-Driven Architecture (MDA) provides a model transformation framework for transitioning between OOAD phases. Considering the advantages of MDA in phase transitions, this study proposes that integrating conventional OOAD instruction with the MDA framework and describing transition relations in diagrammatic representations might improve students’ understanding of the transitions. This study used an empirical design that involved using two treatments (MDA-based and conventional instruction) to examine the relevance of MDA-based instruction in the effective understanding of the transitions on the basis of cognitive load theory, the split-attention principle, and theories of representation format.
Erkki Kaila, Einari Kurvinen, Erno Lokkila, Mikko-Jussi Laakso
Educational technology offers several potential benefits for programming education. Still, to facilitate the technology properly, integration into a course must be carefully designed. In this article, we present a redesign of an object-oriented university-level programming course. In the redesign, a collaborative education tool was utilized to enhance active learning, facilitate communication between students and teachers, and remodel the evaluation procedure by utilizing automatically assessed tasks. The redesign was based on the best practices found in our own earlier research and that of the research community, with a focus on facilitating active learning methods and student collaboration. The redesign was evaluated by comparing two instances of the redesigned course against two instances using the old methodology.
Monica M. McGill, Adrienne Decker, Amber Settle
A lack of diversity in the computing field has existed for several decades, and although female participation in computing remains low, outreach programs attempting to address the situation are now quite numerous. To begin to understand whether or not these past activities have had long-term impact, we conducted a systematic literature review. Upon discovering that longitudinal studies were lacking, we investigated whether undergraduate students believed that their participation in computing activities prior to college contributed to their decision to major in a computing field. From the 770 participants in the study, we discovered that approximately 20% of males and 24% of females who were required to participate in computing activities chose a computing or related major, but that males perceived that the activity had a greater affect on their decision (20%) than females (6.9%).
Blair Taylor, Siddharth Kaza
Despite the critical societal importance of computer security, security is not well integrated into the undergraduate computing curriculum. Security classes and tracks treat security issues as separable topics as opposed to fundamental issues that pervade all aspects of software development. Recently, there has been an increasing focus on security as a cross-cutting concern across the computer science curriculum. The Security Injections@Towson project provides resources and effective strategies to incorporate secure coding in the early programming classes. We describe the development, assessment, and dissemination of more than 40 lab-based security injection modules designed to be injected into courses with minimal impact on the curriculum.
Michael Kölling, Fraser McKay
The past few years has seen a proliferation of novice programming tools. The availability of a large number of systems has made it difficult for many users to choose among them. Even for education researchers, comparing the relative quality of these tools, or judging their respective suitability for a given context, is hard in many instances. For designers of such systems, assessing the respective quality of competing design decisions can be equally difficult. Heuristic evaluation provides a practical method of assessing the quality of alternatives in these situations and of identifying potential problems with existing systems for a given target group or context.