Conceptualisation of an effective learning environment for programming through an analysis of the underlying research issues in teaching programming
Keywords:programming, computer programming, CABLE, collaborative learning, cognitive apprenticeship, modelling, metacognition, computer mediated communication
This paper provides insights into the underlying research on issues in teaching introductory programming at university which gave rise to the conceptualisation of the CABLE model – a learning environment for teaching computer programming trialled at the National University of Samoa over a period of 3 years. The paper describes why students find programming difficult. From analysis of the research, potential solutions are proposed. These solutions form the basis of recommendations for the conceptualization and establishment of a model of a learning environment called CABLE. Findings from the analyses of research on issues in teaching programming are also used as recommendations on methodology and implementation details
of the proposed pedagogical model.
J. Baek, R. Safavi-Naini, and W. Susilo, “Public key encryption with keyword search revisited,”in Computational Science and Its Applications-ICCSA 2008, LNCS, vol. 5072, pp. 1249-1259, 2008.
D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano, “Public key encryption with keyword search,” in Eurocrypt 2004, LNCS, vol. 3027, pp. 506–522, 2004.
D. Boneh and B. Waters, “Conjunctive, subset, and range queries on encrypted data,”in Proceedings of TCC'07, LNCS, vol. 4392, pp. 535-554, 2007.
D. Boneh, C. Gentry and B. Waters, “Collusion resistant broadcast encryption with short ciphertexts and private keys,”in Crypto’05, vol. 3621, pp. 258-275, 2005.
D. Boneh, X. Boyen, and E. J. Goh, “Hierarchical identity based encryption with constant size
ciphertext,” in Advances in Cryptology–Eurocrypt’05, LNCS, vol. 3494, pp. 440–456, 2005.
V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,”in CCS '06 proceedings of the 13th ACM conference on Computer and communications security, pp. 89-98, 2006.
Y. H. Hwang and P.J. Lee, “Public key encryption with conjunctive keyword search and its extension to a multi-user system,”in Pairing-based Cryptography –PAIRING 2007, LNCS, vol. 4575, pp. 2-22, 2007.
D. Naor, M. Maor, and J. Lotspiech, “Revocation and tracing schemes for stateless receivers,”in Advances in Cryptology–Crypto’01, vol. 2139, pp. 41–62, 2001.
M. Naor and B. Pinkas, “Efficient trace and revoke schemes,” inProceedings of the 4th International Conference on Financial Cryptography (FC’00), vol. 1962, pp. 1–20, 2000.
J. H. Park, “Efficient hidden vector encryption for conjunctive queries on encrypted data,”IEEE Transactions on Knowledge and Data Engineering, vol. 23, no. 10, pp. 1483-1497, 2011.
J. H. Park, H. J. Kim, M. H. Sung and D. H. Lee, “Public key broadcast encryption schemes with shorter transmissions,”IEEE Transactions on Broadcasting, vol. 54, no. 3, pp.401-411, 2008.
A. Sahai and B. Waters, “Fuzzy identity based encryption,”in Advances in Cryptology–Eurocrypt 2005, LNCS, vol. 3494, pp. 457–473, 2005.
How to Cite
Copyright (c) 2020 International Journal on Information Technology and Computer Science
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.