Posts

Showing posts from November, 2011

Greenfoot and robots

Image
One of the criticism of the using robots for teaching problem solving is they are finite resources, there is a risk that some students will dominate the programming in group work. To address this a new feature has been added to the teaching of problem-solving activities. There are now two parallel activities  as well as programming a robot; there is a separate programming exercise carried out at the same time which replicates some of the same actions of the robot but this time on screen.
These exercises are based around the increasingly popular Greenfoot software (http://www.greenfoot.org/download/) which is free to download and use. This can be put on as many machines as are need enabling more people to have a go at programming.
The exercises initially gets participants to set-up the world, place a robot within it and get the robot to move across the screen. Building on the each previous exercise, the complexity increases and includes challenges (such as in the figure) where the robot …

Model for Computer Forensics

Image
An paper on teaching computer forensics was recent published at 7th Annual Teaching Computer Forensics Workshop University of Sunderland on the 10th Nov 2011.


An Embedded Pedagogic Model for Computer Forensics within an
Undergraduate Programme
Authors: Ali Al-Sherbaz , Amir Minai, James Xue, Rashmi Dravid , The University of Northampton


Abstract
The discipline of computer forensics which has a strong mutli-disciplinary background derives from the computing subjects in networking, programming, security and mathematics. Increasing awareness of cybersecurity and emphasising the need for a common vision among students addresses the challenges. The proposed pedagogic model is to embed the computer forensics materials within the undergraduate modules to extend students’ knowledge and skills in a practical context. However, it is also recognised that the depth of knowledge required learning such topics as cyber security should be offered from the underlying principles to their abstraction.


Cyber c…