Yükseköğretimdeki kampüs içinde uygulamalı ağ kurma derslerini modernleştirmede bir ön gereklilik olarak öğrencilerin öğrenim davranışının ve başarısının değerlendirilmesi

Yükseköğretimdeki bilgisayar bilimleri müfredatı, öğrencilerin teorik bilgilerini uygulayabildikleri, derinleştirebildikleri ve sağlamlaştırdıkları uygulamalı dersleri içermektedir. Üniversiteler, eğitim sistemine uygun öğrenim ortamı sunmak ve ayrıca öğrencilerin ihtiyaçlarını karşılamak zorundadır. Öğrencileri destekleyecek çeşitli teknik konseptlere sahip olmanın yanı sıra eğitim personeli, bu konseptlerin mevcut bir öğrenim ortamına uygun olup olmadığına ve bunların geliştirilmeye müsait olup olmadıklarına karar verebilmek amacıyla öğrencilerin öğrenim davranışlarını bilmek zorundadır. İkiyüzün üzerinde katılımcıya sahip uygulamalı bir üniversite dersi, öğrenim başarısı, öğrencilerin öğrenim davranışı ve tercih ettikleri ortam bakımından değerlendirilmiştir. Değerlendirme, dersin genel olarak başarılı olduğunu, çoğu öğrencinin dersi geçtiğini ve bireysel öğrenim başarılarını yüksek seviyeye çıkardığını göstermektedir. Ancak yüksek derecede esneklik göz önüne alındığında öğrencilerin büyük bir çoğunluğu, arzu ettikleri öğrenim ortamı olarak, ders danışmanlarıyla desteklenen üniversite laboratuvarında grup halinde çalışmayı seçmiştir. Karma öğrenim yöntemlerini kullanarak bir kampüs içi uygulamalı dersi modernleştirirken, bu sonuçlar dikkate alınmalıdır.

Evaluation of Students' Learning Behaviour and Success as a Prerequisite for Modernizing Practical on Campus Networking Courses in Higher Education

Computer science curricula in higher education include practical courses, where students can apply, deepen and anchor their theoretical knowledge. Universities have to provide a learning environment which fits into the educational system and also meets the needs of the students. While having various technical concepts to support the students, educational staff has to know the students' learning behaviour in order to decide, whether these concepts fit into and can improve upon an existing learning environment. A practical university course with more than 200 participants was evaluated with regard to learning success, students' learning behaviour and their preferred environments. The evaluation shows that the course was generally successful, most of the students passed and rate their individual learning success as high. Although given a high degree of flexibility, a majority of students chose working in a group at the university's laboratory supported by course advisors as their desired learning environment. These outcomes should be considered when modernizing a practical on-campus course by introducing methods of blended learning.

___

  • Bishop, M., and Heberlein, L. (1996). An isolated network for research. In 19th National Information Systems Security Conference (pp. 22-25). October 22-25, 1996, Baltimore, MD, USA.
  • Border, C. (2007). The development and deployment of a multi-user, remote access virtualization system for networking, security, and sys- tem administration classes. In Proceedings of the 38th SIGCSE Technical Symposium on Computer Science Education (pp. 576-580). New York, NY: ACM.
  • Bullers, Jr., W., Burd, S., and Seazzu, A. (2006). Virtual machines - an idea whose time has returned: application to network, security, and data- base courses. In Proceedings of the 37th SIGCSE technical symposium on Computer science education (pp. 102-106). New York, NY: ACM.
  • Dike, J. (2006). User mode Linux. Upper Saddle River, NJ: Prentice Hall.
  • Gaspar, A., Langevin, S., and Armitage, W. (2007). Virtualization tech- nologies in the undergraduate IT curriculum. IT Professional, 9(4), 10-17.
  • Gephart, N., and Kuperman, B. A. (2010). Design of a virtual computer lab environment for hands-on information security exercises. Journal of Computing Sciences in Colleges, 26(1), 32-39.
  • Haag, J., Horsmann, T., Karsch, S., and Vranken, H. (2011). A distrib- uted virtual computer security lab with central authority. In Proceedings of the Computer Science Education Research Conference (pp. 89-95). Heerlen, The Netherlands: Open Universiteit.
  • Haag, J., Karsch, S., Vranken, H., and van Eekelen, M. (2012). A virtual computer security lab as learning environment for networking and security courses. In Proceedings of the 3rd Annual International Conference on Computer Science Education: Innovation and Technology (pp. 61-68). Singapore: Global Science & Technology Forum.
  • Haag, J., Witte, C., Karsch, S., Vranken, H., and van Eekelen, M. (2013). Evaluation of students' learning behaviour and success in a practical computer networking course. In Proceedings of the 2013 Second International Conference on e-Learning and e-Technologies in Education (ICEEE) (pp. 201-206). Lodz, Poland.
  • Helps, C., and Ekstrom, J. (2008). Evaluation of a computer networking class. In Proceedings of the 9th ACM SIGITE Conference on Information Technology Education (pp. 259-268). New York, NY: ACM.
  • Hill, J., Carver, Jr., C., Humphries, J., and Pooch, U. (2001). Using an isolated network laboratory to teach advanced networks and security. In Proceedings of theTthirty-Second SIGCSE Technical Symposium on Computer Science Education (pp. 36-40). New York, NY: ACM.
  • Hu, J., Cordel, D., and Meinel, C. (2005). Virtual machine management for tele-lab "IT-Security" server. In Proceedings of the 10th IEEE Symposium on Computers and Communications (pp. 448-453). Washington, DC: IEEE Computer Society.
  • Keller, J., and Naues, R. (2006). Design of a virtual computer security lab. In Proceedings of the Third IASTED International Conference on Communication, Network, and Information Security, (pp. 211-215). Calgary, AB, Canada: ACTA Press.
  • Li, P. (2009). Exploring virtual environments in a decentralized lab. ACM SIGITE Research in IT, 6(1), 4-10.
  • O’Leary, M. (2006). A laboratory based capstone course in computer security for undergraduates. In Proceedings of the 37th SIGCSE Technical Symposium on Computer Science Education (pp. 2-6). New York, NY: ACM.
  • Pizzonia, M., and Rimondini, M. (2008). Netkit: easy emulation of com- plex networks on inexpensive hardware. In Proceedings of the 4th International Conference on Testbeds and Research Infrastructures for the Development of Networks & Communities (Article No. 7). Brussels, Belgium: ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering).
  • Sloan, J., and Schlindwein, C. (2004). TCP/IP laboratory exercises for use with a remotely accessible networking laboratory. In Journal of Computing Sciences in Colleges, 19(3), 68-78.
  • Standard, S., Greenlaw, R., Phillips, A., Stahl, D., and Schultz, J. (2013). Network reconnaissance, attack, and defense laboratories for an introductory cyber-security course. In ACM Inroads, 4(3), 52-64.
  • Vassileva, D. (2011). Evaluation of learning styles adaption in the adop- ta e-learning platform. In Proceedings of the 12th International Conference on Computer Systems and Technologies (pp. 540-545). New York, NY: ACM.
  • Vranken, H., and Koppelman, H. (2009). A virtual computer security lab for distance education. In Proceedings of the 5th European Conference on Internet and Multimedia Systems and Applications (pp. 21-27). Calgary, AB, Canada: Acta Press.
  • Vranken, H., Haag, J., Horsmann, T., and Karsch, S. (2011). A distrib- uted virtual computer security lab. In Proceedings of the 3rd interna- tional Conference on Computer Supported Education (pp. 110-119). Noordwijkerhout, The Netherlands: SciTePress.
  • Wagner, P., and Wudi, J. (2004). Designing and implementing a cyber- war laboratory exercise for a computer security course. In Proceedings of the 35th SIGCSE technical symposium on Computer science education (pp. 402-406). New York, NY: ACM.
  • Xu, L., Huang, D., and Tsai, W.-T. (2012). V-lab: a cloud-based virtual laboratory platform for hands-on networking courses. In Proceedings of the 17th ACM annual Conference on Innovation and Technology in Computer Science Education (pp. 256-261). New York, NY: ACM.
  • Yu, Y. (2007). Designing hands-on lab exercises in the network security course. Journal of Computing Sciences in Colleges, 22(5), 105-110.
  • Yuan, D., Schlough, S., and Anderson, B. (2013). Using outcome based learning assessment to evaluate and improve the hands-on network- ing course. Journal of Computing Sciences in Colleges, 29(2), 220-228).