Conceptualisation of an effective learning environment for programming through an analysis of the underlying research issues in teaching programming

Authors

  • Ioana Tuugalei Chan Mow National University of Samoa, Apia,

Keywords:

programming, computer programming, CABLE, collaborative learning, cognitive apprenticeship, modelling, metacognition, computer mediated communication

Abstract

This paper provides insights into the underlying research on issues in teaching introductory programming at university which gave rise to the conceptualisation of the CABLE model – a learning environment for teaching computer programming trialled at the National University of Samoa over a period of 3 years. The paper describes why students find programming difficult. From analysis of the research, potential solutions are proposed. These solutions form the basis of recommendations for the  conceptualization and establishment of a model of a learning environment called CABLE. Findings from the analyses of research on issues in teaching programming are also used as recommendations on methodology and implementation details
of the proposed pedagogical model.

Author Biography

Ioana Tuugalei Chan Mow, National University of Samoa, Apia,

Computing Department

References

J. Baek, R. Safavi-Naini, and W. Susilo, “Public key encryption with keyword search revisited,”in Computational Science and Its Applications-ICCSA 2008, LNCS, vol. 5072, pp. 1249-1259, 2008.

D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano, “Public key encryption with keyword search,” in Eurocrypt 2004, LNCS, vol. 3027, pp. 506–522, 2004.

D. Boneh and B. Waters, “Conjunctive, subset, and range queries on encrypted data,”in Proceedings of TCC'07, LNCS, vol. 4392, pp. 535-554, 2007.

D. Boneh, C. Gentry and B. Waters, “Collusion resistant broadcast encryption with short ciphertexts and private keys,”in Crypto’05, vol. 3621, pp. 258-275, 2005.

D. Boneh, X. Boyen, and E. J. Goh, “Hierarchical identity based encryption with constant size

ciphertext,” in Advances in Cryptology–Eurocrypt’05, LNCS, vol. 3494, pp. 440–456, 2005.

V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-based encryption for fine-grained access control of encrypted data,”in CCS '06 proceedings of the 13th ACM conference on Computer and communications security, pp. 89-98, 2006.

Y. H. Hwang and P.J. Lee, “Public key encryption with conjunctive keyword search and its extension to a multi-user system,”in Pairing-based Cryptography –PAIRING 2007, LNCS, vol. 4575, pp. 2-22, 2007.

D. Naor, M. Maor, and J. Lotspiech, “Revocation and tracing schemes for stateless receivers,”in Advances in Cryptology–Crypto’01, vol. 2139, pp. 41–62, 2001.

M. Naor and B. Pinkas, “Efficient trace and revoke schemes,” inProceedings of the 4th International Conference on Financial Cryptography (FC’00), vol. 1962, pp. 1–20, 2000.

J. H. Park, “Efficient hidden vector encryption for conjunctive queries on encrypted data,”IEEE Transactions on Knowledge and Data Engineering, vol. 23, no. 10, pp. 1483-1497, 2011.

J. H. Park, H. J. Kim, M. H. Sung and D. H. Lee, “Public key broadcast encryption schemes with shorter transmissions,”IEEE Transactions on Broadcasting, vol. 54, no. 3, pp.401-411, 2008.

A. Sahai and B. Waters, “Fuzzy identity based encryption,”in Advances in Cryptology–Eurocrypt 2005, LNCS, vol. 3494, pp. 457–473, 2005.

Additional Files

Published

2020-09-02

How to Cite

Chan Mow, I. T. . (2020). Conceptualisation of an effective learning environment for programming through an analysis of the underlying research issues in teaching programming. International Journal on Information Technology and Computer Science, 4(2). Retrieved from http://ijitcs.info/index.php/ijitcs/article/view/17

Issue

Section

Research Articles