BibTex RIS Kaynak Göster

Yükseköğretimdeki kampüs içinde uygulamalı ağ kurma derslerini modernleştirmede bir ön gereklilik olarak öğrencilerin öğrenim davranışının ve başarısının değerlendirilmesi

Yıl 2014, Cilt: 4 Sayı: 2, 83 - 90, 01.08.2014

Öz

Yükseköğretimdeki bilgisayar bilimleri müfredatı, öğrencilerin teorik bilgilerini uygulayabildikleri, derinleştirebildikleri ve sağlamlaştırdıkları uygulamalı dersleri içermektedir. Üniversiteler, eğitim sistemine uygun öğrenim ortamı sunmak ve ayrıca öğrencilerin ihtiyaçlarını karşılamak zorundadır. Öğrencileri destekleyecek çeşitli teknik konseptlere sahip olmanın yanı sıra eğitim personeli, bu konseptlerin mevcut bir öğrenim ortamına uygun olup olmadığına ve bunların geliştirilmeye müsait olup olmadıklarına karar verebilmek amacıyla öğrencilerin öğrenim davranışlarını bilmek zorundadır. İkiyüzün üzerinde katılımcıya sahip uygulamalı bir üniversite dersi, öğrenim başarısı, öğrencilerin öğrenim davranışı ve tercih ettikleri ortam bakımından değerlendirilmiştir. Değerlendirme, dersin genel olarak başarılı olduğunu, çoğu öğrencinin dersi geçtiğini ve bireysel öğrenim başarılarını yüksek seviyeye çıkardığını göstermektedir. Ancak yüksek derecede esneklik göz önüne alındığında öğrencilerin büyük bir çoğunluğu, arzu ettikleri öğrenim ortamı olarak, ders danışmanlarıyla desteklenen üniversite laboratuvarında grup halinde çalışmayı seçmiştir. Karma öğrenim yöntemlerini kullanarak bir kampüs içi uygulamalı dersi modernleştirirken, bu sonuçlar dikkate alınmalıdır.

Kaynakça

  • Bishop, M., and Heberlein, L. (1996). An isolated network for research. In 19th National Information Systems Security Conference (pp. 22-25). October 22-25, 1996, Baltimore, MD, USA.
  • Border, C. (2007). The development and deployment of a multi-user, remote access virtualization system for networking, security, and sys- tem administration classes. In Proceedings of the 38th SIGCSE Technical Symposium on Computer Science Education (pp. 576-580). New York, NY: ACM.
  • Bullers, Jr., W., Burd, S., and Seazzu, A. (2006). Virtual machines - an idea whose time has returned: application to network, security, and data- base courses. In Proceedings of the 37th SIGCSE technical symposium on Computer science education (pp. 102-106). New York, NY: ACM.
  • Dike, J. (2006). User mode Linux. Upper Saddle River, NJ: Prentice Hall.
  • Gaspar, A., Langevin, S., and Armitage, W. (2007). Virtualization tech- nologies in the undergraduate IT curriculum. IT Professional, 9(4), 10-17.
  • Gephart, N., and Kuperman, B. A. (2010). Design of a virtual computer lab environment for hands-on information security exercises. Journal of Computing Sciences in Colleges, 26(1), 32-39.
  • Haag, J., Horsmann, T., Karsch, S., and Vranken, H. (2011). A distrib- uted virtual computer security lab with central authority. In Proceedings of the Computer Science Education Research Conference (pp. 89-95). Heerlen, The Netherlands: Open Universiteit.
  • Haag, J., Karsch, S., Vranken, H., and van Eekelen, M. (2012). A virtual computer security lab as learning environment for networking and security courses. In Proceedings of the 3rd Annual International Conference on Computer Science Education: Innovation and Technology (pp. 61-68). Singapore: Global Science & Technology Forum.
  • Haag, J., Witte, C., Karsch, S., Vranken, H., and van Eekelen, M. (2013). Evaluation of students' learning behaviour and success in a practical computer networking course. In Proceedings of the 2013 Second International Conference on e-Learning and e-Technologies in Education (ICEEE) (pp. 201-206). Lodz, Poland.
  • Helps, C., and Ekstrom, J. (2008). Evaluation of a computer networking class. In Proceedings of the 9th ACM SIGITE Conference on Information Technology Education (pp. 259-268). New York, NY: ACM.
  • Hill, J., Carver, Jr., C., Humphries, J., and Pooch, U. (2001). Using an isolated network laboratory to teach advanced networks and security. In Proceedings of theTthirty-Second SIGCSE Technical Symposium on Computer Science Education (pp. 36-40). New York, NY: ACM.
  • Hu, J., Cordel, D., and Meinel, C. (2005). Virtual machine management for tele-lab "IT-Security" server. In Proceedings of the 10th IEEE Symposium on Computers and Communications (pp. 448-453). Washington, DC: IEEE Computer Society.
  • Keller, J., and Naues, R. (2006). Design of a virtual computer security lab. In Proceedings of the Third IASTED International Conference on Communication, Network, and Information Security, (pp. 211-215). Calgary, AB, Canada: ACTA Press.
  • Li, P. (2009). Exploring virtual environments in a decentralized lab. ACM SIGITE Research in IT, 6(1), 4-10.
  • O’Leary, M. (2006). A laboratory based capstone course in computer security for undergraduates. In Proceedings of the 37th SIGCSE Technical Symposium on Computer Science Education (pp. 2-6). New York, NY: ACM.
  • Pizzonia, M., and Rimondini, M. (2008). Netkit: easy emulation of com- plex networks on inexpensive hardware. In Proceedings of the 4th International Conference on Testbeds and Research Infrastructures for the Development of Networks & Communities (Article No. 7). Brussels, Belgium: ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering).
  • Sloan, J., and Schlindwein, C. (2004). TCP/IP laboratory exercises for use with a remotely accessible networking laboratory. In Journal of Computing Sciences in Colleges, 19(3), 68-78.
  • Standard, S., Greenlaw, R., Phillips, A., Stahl, D., and Schultz, J. (2013). Network reconnaissance, attack, and defense laboratories for an introductory cyber-security course. In ACM Inroads, 4(3), 52-64.
  • Vassileva, D. (2011). Evaluation of learning styles adaption in the adop- ta e-learning platform. In Proceedings of the 12th International Conference on Computer Systems and Technologies (pp. 540-545). New York, NY: ACM.
  • Vranken, H., and Koppelman, H. (2009). A virtual computer security lab for distance education. In Proceedings of the 5th European Conference on Internet and Multimedia Systems and Applications (pp. 21-27). Calgary, AB, Canada: Acta Press.
  • Vranken, H., Haag, J., Horsmann, T., and Karsch, S. (2011). A distrib- uted virtual computer security lab. In Proceedings of the 3rd interna- tional Conference on Computer Supported Education (pp. 110-119). Noordwijkerhout, The Netherlands: SciTePress.
  • Wagner, P., and Wudi, J. (2004). Designing and implementing a cyber- war laboratory exercise for a computer security course. In Proceedings of the 35th SIGCSE technical symposium on Computer science education (pp. 402-406). New York, NY: ACM.
  • Xu, L., Huang, D., and Tsai, W.-T. (2012). V-lab: a cloud-based virtual laboratory platform for hands-on networking courses. In Proceedings of the 17th ACM annual Conference on Innovation and Technology in Computer Science Education (pp. 256-261). New York, NY: ACM.
  • Yu, Y. (2007). Designing hands-on lab exercises in the network security course. Journal of Computing Sciences in Colleges, 22(5), 105-110.
  • Yuan, D., Schlough, S., and Anderson, B. (2013). Using outcome based learning assessment to evaluate and improve the hands-on network- ing course. Journal of Computing Sciences in Colleges, 29(2), 220-228).

Evaluation of Students' Learning Behaviour and Success as a Prerequisite for Modernizing Practical on Campus Networking Courses in Higher Education

Yıl 2014, Cilt: 4 Sayı: 2, 83 - 90, 01.08.2014

Öz

Computer science curricula in higher education include practical courses, where students can apply, deepen and anchor their theoretical knowledge. Universities have to provide a learning environment which fits into the educational system and also meets the needs of the students. While having various technical concepts to support the students, educational staff has to know the students' learning behaviour in order to decide, whether these concepts fit into and can improve upon an existing learning environment. A practical university course with more than 200 participants was evaluated with regard to learning success, students' learning behaviour and their preferred environments. The evaluation shows that the course was generally successful, most of the students passed and rate their individual learning success as high. Although given a high degree of flexibility, a majority of students chose working in a group at the university's laboratory supported by course advisors as their desired learning environment. These outcomes should be considered when modernizing a practical on-campus course by introducing methods of blended learning.

Kaynakça

  • Bishop, M., and Heberlein, L. (1996). An isolated network for research. In 19th National Information Systems Security Conference (pp. 22-25). October 22-25, 1996, Baltimore, MD, USA.
  • Border, C. (2007). The development and deployment of a multi-user, remote access virtualization system for networking, security, and sys- tem administration classes. In Proceedings of the 38th SIGCSE Technical Symposium on Computer Science Education (pp. 576-580). New York, NY: ACM.
  • Bullers, Jr., W., Burd, S., and Seazzu, A. (2006). Virtual machines - an idea whose time has returned: application to network, security, and data- base courses. In Proceedings of the 37th SIGCSE technical symposium on Computer science education (pp. 102-106). New York, NY: ACM.
  • Dike, J. (2006). User mode Linux. Upper Saddle River, NJ: Prentice Hall.
  • Gaspar, A., Langevin, S., and Armitage, W. (2007). Virtualization tech- nologies in the undergraduate IT curriculum. IT Professional, 9(4), 10-17.
  • Gephart, N., and Kuperman, B. A. (2010). Design of a virtual computer lab environment for hands-on information security exercises. Journal of Computing Sciences in Colleges, 26(1), 32-39.
  • Haag, J., Horsmann, T., Karsch, S., and Vranken, H. (2011). A distrib- uted virtual computer security lab with central authority. In Proceedings of the Computer Science Education Research Conference (pp. 89-95). Heerlen, The Netherlands: Open Universiteit.
  • Haag, J., Karsch, S., Vranken, H., and van Eekelen, M. (2012). A virtual computer security lab as learning environment for networking and security courses. In Proceedings of the 3rd Annual International Conference on Computer Science Education: Innovation and Technology (pp. 61-68). Singapore: Global Science & Technology Forum.
  • Haag, J., Witte, C., Karsch, S., Vranken, H., and van Eekelen, M. (2013). Evaluation of students' learning behaviour and success in a practical computer networking course. In Proceedings of the 2013 Second International Conference on e-Learning and e-Technologies in Education (ICEEE) (pp. 201-206). Lodz, Poland.
  • Helps, C., and Ekstrom, J. (2008). Evaluation of a computer networking class. In Proceedings of the 9th ACM SIGITE Conference on Information Technology Education (pp. 259-268). New York, NY: ACM.
  • Hill, J., Carver, Jr., C., Humphries, J., and Pooch, U. (2001). Using an isolated network laboratory to teach advanced networks and security. In Proceedings of theTthirty-Second SIGCSE Technical Symposium on Computer Science Education (pp. 36-40). New York, NY: ACM.
  • Hu, J., Cordel, D., and Meinel, C. (2005). Virtual machine management for tele-lab "IT-Security" server. In Proceedings of the 10th IEEE Symposium on Computers and Communications (pp. 448-453). Washington, DC: IEEE Computer Society.
  • Keller, J., and Naues, R. (2006). Design of a virtual computer security lab. In Proceedings of the Third IASTED International Conference on Communication, Network, and Information Security, (pp. 211-215). Calgary, AB, Canada: ACTA Press.
  • Li, P. (2009). Exploring virtual environments in a decentralized lab. ACM SIGITE Research in IT, 6(1), 4-10.
  • O’Leary, M. (2006). A laboratory based capstone course in computer security for undergraduates. In Proceedings of the 37th SIGCSE Technical Symposium on Computer Science Education (pp. 2-6). New York, NY: ACM.
  • Pizzonia, M., and Rimondini, M. (2008). Netkit: easy emulation of com- plex networks on inexpensive hardware. In Proceedings of the 4th International Conference on Testbeds and Research Infrastructures for the Development of Networks & Communities (Article No. 7). Brussels, Belgium: ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering).
  • Sloan, J., and Schlindwein, C. (2004). TCP/IP laboratory exercises for use with a remotely accessible networking laboratory. In Journal of Computing Sciences in Colleges, 19(3), 68-78.
  • Standard, S., Greenlaw, R., Phillips, A., Stahl, D., and Schultz, J. (2013). Network reconnaissance, attack, and defense laboratories for an introductory cyber-security course. In ACM Inroads, 4(3), 52-64.
  • Vassileva, D. (2011). Evaluation of learning styles adaption in the adop- ta e-learning platform. In Proceedings of the 12th International Conference on Computer Systems and Technologies (pp. 540-545). New York, NY: ACM.
  • Vranken, H., and Koppelman, H. (2009). A virtual computer security lab for distance education. In Proceedings of the 5th European Conference on Internet and Multimedia Systems and Applications (pp. 21-27). Calgary, AB, Canada: Acta Press.
  • Vranken, H., Haag, J., Horsmann, T., and Karsch, S. (2011). A distrib- uted virtual computer security lab. In Proceedings of the 3rd interna- tional Conference on Computer Supported Education (pp. 110-119). Noordwijkerhout, The Netherlands: SciTePress.
  • Wagner, P., and Wudi, J. (2004). Designing and implementing a cyber- war laboratory exercise for a computer security course. In Proceedings of the 35th SIGCSE technical symposium on Computer science education (pp. 402-406). New York, NY: ACM.
  • Xu, L., Huang, D., and Tsai, W.-T. (2012). V-lab: a cloud-based virtual laboratory platform for hands-on networking courses. In Proceedings of the 17th ACM annual Conference on Innovation and Technology in Computer Science Education (pp. 256-261). New York, NY: ACM.
  • Yu, Y. (2007). Designing hands-on lab exercises in the network security course. Journal of Computing Sciences in Colleges, 22(5), 105-110.
  • Yuan, D., Schlough, S., and Anderson, B. (2013). Using outcome based learning assessment to evaluate and improve the hands-on network- ing course. Journal of Computing Sciences in Colleges, 29(2), 220-228).
Toplam 25 adet kaynakça vardır.

Ayrıntılar

Diğer ID JA62SC73UA
Bölüm Ampirik Araştırma
Yazarlar

Jens Haag Bu kişi benim

Christian Witte Bu kişi benim

Stefan Karsch Bu kişi benim

Harald Vranken Bu kişi benim

Marko Van Eekelen Bu kişi benim

Yayımlanma Tarihi 1 Ağustos 2014
Yayımlandığı Sayı Yıl 2014 Cilt: 4 Sayı: 2

Kaynak Göster

APA Haag, J., Witte, C., Karsch, S., Vranken, H., vd. (2014). Yükseköğretimdeki kampüs içinde uygulamalı ağ kurma derslerini modernleştirmede bir ön gereklilik olarak öğrencilerin öğrenim davranışının ve başarısının değerlendirilmesi. Yükseköğretim Dergisi, 4(2), 83-90.

Yükseköğretim Dergisi, bünyesinde yayınlanan yazıların fikirlerine resmen katılmaz, basılı ve çevrimiçi sürümlerinde yayınladığı hiçbir ürün veya servis reklamı için güvence vermez. Yayınlanan yazıların bilimsel ve yasal sorumlulukları yazarlarına aittir. Yazılarla birlikte gönderilen resim, şekil, tablo vb. unsurların özgün olması ya da daha önce yayınlanmış iseler derginin hem basılı hem de elektronik sürümünde yayınlanabilmesi için telif hakkı sahibinin yazılı onayının bulunması gerekir. Yazarlar yazılarının bütün yayın haklarını derginin yayıncısı Türkiye Bilimler Akademisi'ne (TÜBA) devrettiklerini kabul ederler. Yayınlanan içeriğin (yazı ve görsel unsurlar) telif hakları dergiye ait olur. Dergide yayınlanması uygun görülen yazılar için telif ya da başka adlar altında hiçbir ücret ödenmez ve baskı masrafı alınmaz; ancak ayrı baskı talepleri ücret karşılığı yerine getirilir.

TÜBA, yazarlardan devraldığı ve derginin çevrimiçi (online) sürümünde yayımladığı içerikle ilgili telif haklarından, bilimsel içeriğe evrensel açık erişimin (open access) desteklenmesi ve geliştirilmesine katkıda bulunmak amacıyla, bilinen standartlarda kaynak olarak gösterilmesi koşuluyla, ticari kullanım amacı ve içerik değişikliği dışında kalan tüm kullanım (çevrimiçi bağlantı verme, kopyalama, baskı alma, herhangi bir fiziksel ortamda çoğaltma ve dağıtma vb.) haklarını (ilgili içerikte tersi belirtilmediği sürece) Creative Commons Attribution-NonCommercial-NoDerivs 4.0 Unported (CC BY-NC-ND4.0) Lisansı aracılığıyla bedelsiz kullanıma sunmaktadır. İçeriğin ticari amaçlı kullanımı için TÜBA'dan yazılı izin alınması gereklidir.