How students reason about Cybersecurity concepts
暂无分享,去创建一个
Dhananjay S. Phatak | Alan T. Sherman | Geoffrey L. Herman | Linda Oliva | David DeLatte | Travis Scheponik | Julia Thompson
[1] R. Brown,et al. Consideration of the origin of Herbert Simon's theory of “satisficing” (1933‐1947) , 2004 .
[2] Michael C. Loui,et al. Describing the What and Why of Students’ Difficulties in Boolean Logic , 2012, TOCE.
[3] Douglas B. Clark,et al. An Overview of Conceptual Change Theories. , 2007 .
[4] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .
[5] Alan T. Sherman,et al. Identifying Core Concepts of Cybersecurity: Results of Two Delphi Processes , 2018, IEEE Transactions on Education.
[6] David Perkins,et al. Fragile knowledge and neglected strategies in novice programmers , 1985 .
[7] Michael C. Loui,et al. Flip-Flops in Students' Conceptions of State , 2012, IEEE Transactions on Education.
[8] Herbert A. Simon,et al. The Sciences of the Artificial , 1970 .
[9] Geoffrey L. Herman,et al. Novice-led paired thematic analysis: A method for conceptual change in en- gineering , 2013 .
[10] R. Glaser,et al. Knowing What Students Know: The Science and Design of Educational Assessment , 2001 .
[11] Martin C. Libicki,et al. Hackers Wanted: An Examination of the Cybersecurity Labor Market , 2014 .
[12] Steve Roach,et al. Computer Science curricula 2013: getting involved and getting ready , 2013, SGCS.
[13] Andrea A. diSessa,et al. Coherence versus fragmentation in the development of the concept of force , 2004, Cogn. Sci..
[14] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[15] Joint Task Force on Computing Curricula. Computer Science Curricula 2013: Curriculum Guidelines for Undergraduate Degree Programs in Computer Science , 2013 .
[16] Michelene T. H. Chi,et al. Commonsense Conceptions of Emergent Processes: Why Some Misconceptions Are Robust , 2005 .