Home
About Us
UI Blog
Contact Us
Clipboard & History
Search history (0)
Clipboard (0)
searchable interface
Affiliation
All Fields
Author
Author - First
Author - Identifier
Author - Last
Book
Conflict of Interest Statements
Editor
Issue
Journal
Language
MeSH Terms
Pagination
Publication Type
Publication Year
Publisher
Title
Title/Abstract
Transliterated Title
Volume
Find
Please fill out this field.
Display options
Format
Abstract
PubMed
PMID
Save
Email
Cite
Cite
AMA
Dark MJ, Manigault CW. Creating open-ended problems for STEM courses and diverse learners using information assurance and security themes. 2006;109-115
APA
Dark, M. J., & Manigault, C. W. (2006). Creating open-ended problems for STEM courses and diverse learners using information assurance and security themes. 109-115.
MLA
Dark, M J, and Manigault, C W. "Creating open-ended problems for STEM courses and diverse learners using information assurance and security themes." vol. (2006): 109-115.
NLM
Dark MJ, Manigault CW. Creating open-ended problems for STEM courses and diverse learners using information assurance and security themes. 2006;109-115. UIID-AD: 962.
Copy
Download .nbib
Format:
NLM
AMA
APA
MLA
NLM
Send to
Clipboard
My Bibliography
Collections
Citation Manager
Share it on
Link
Direct link
Direct link
2006;109-115.
Creating open-ended problems for STEM courses and diverse learners using information assurance and security themes.
M J Dark
,
C W Manigault
UIID-AD: 962
Abstract
There is the need in colleges and universities across the country field of Computer Information to attract students to lite ion Assurance and Security and support those students through a program of study, that will culminate in their graduation and subsequent employmnent in the field. Simultaneously, there is a need to attract students, especially populations of underrepresented students, into the areas of science, technology, engineering, and mathematics (STEM). This paper addresses both of those needs by , exploring open-endedprohleni solving with the use of model-eliciting activities (UEAs) and applying the same to problems that deal with information assurance and security. The specific example explored in this paper deals with middle school students forming leanis to develop problem solutions and procedures for questions of collection, storage, and retrieval of various kinds of data, using acceptable confidentiality, integrity, and availability guidelines and screenings.
Publication Types
Books and Documents
Save results to a file
No records selected. Please select records to continue.
Format
Summary (text)
PubMed
PMID
Abstract (text)
CSV
Email results
Only first 240 records will be saved in your file.
No records selected. Please select records to continue.
Email subject
UIINDEX - UIID-AD: 962
Send email to
Format
Summary
Summary (text)
Abstract
Abstract (text)
Captcha
Citation copied successfully.