- Accreditation Board for Engineering and Technology. Abet.org/accreditation/accreditation-criteria. Accessed 2022 June 6.Google Scholar
- ACM Committee for Computing Education in Community Colleges. Curricular Guidance. https://ccecc.acm.org/guidance. Accessed 2022 June 6.Google Scholar
- Barr, V. Different Denominators, Different Results: Reanalyzing CS Degrees by Gender, Race and Ethnicity, ACM Inroads, 9, 3 (2018), 40--47.Google ScholarDigital Library
- Carnegie Classifications. Carnegieclassifications.iu.edu. Accessed 2022 April 8.Google Scholar
- Computing Curricula 2020: Paradigms for Global Computing Education. https://dl.acm.org/citation.cfm?id=3467967. Accessed 2022 June 6.Google Scholar
- Duran, R., Hawthorne, E., Sabin, M., Tang, C., Weiss, M., and Zweben, S. Retention in 2017--18 Higher Education Computing Programs in the United States. ACM Inroads, 12, 2 (2021), 18--28.Google ScholarDigital Library
- National Center for Education Statistics (2021). CIP Codes. https://nces.ed.gov/peds/cipcode/browse.aspx?y=56. Accessed 2022 June 6.Google Scholar
- National Center for Education Statistics (2022). Digest of Education Statistics. https://nces.ed.gov/programs/digest/current_tables.asp. Accessed 2022 April 14.Google Scholar
- National Student Clearinghouse. Studentclearinghouse.org. Accessed 2022 June 6.Google Scholar
- National Student Clearinghouse Research Center (2020). Term Enrollment Estimates, Fall 2020. National Student Clearinghouse Research Center. https://nscresearchcenter.org/wp-content/uploads/CTEE_Report_Fall_2020.pdf. Accessed 2022 Oct 15.Google Scholar
- National Student Clearinghouse Research Center (2022). Persistence and Retention, Fall 2020 Beginning Postsecondary Student Cohort. National Student Clearinghouse Research Center. June 2022. https://nscresearchcenter.org/wp-content/uploads/PersistenceRetention2022.pdf. Accessed 2022 Oct 15.Google Scholar
- Sabin, M., Zweben, S., Lunt, B., and Raj, R. Evaluating Student Participation in Information Technology Programs in the U.S. SIGITE'20: Proceedings of the 21st Annual Conference on Information Technology Education. Virtual Event: ACM, 2020, 93--99.Google Scholar
- Stephenson, C., Derbenwick Miller, A., Alvarado, C., Barker, L., Barr, V., Camp, T., Frieze, C., Lewis, C., Cannon Mindell, E., Limbird, L., Richardson, D., Sahami, M., Villa, E., Walker, H., and Zweben, S. Retention in Computer Science Undergraduate Programs in the U.S.: Data Challenges and Promising Interventions. (New York, NY, ACM, 2018).Google ScholarDigital Library
- Tang, C., Tucker, C., Weiss, M. and Zweben, S. Tracking CS Graduates and Non-Retained Students to the Following Year's Academic Programs, ACM Inroads 12, 4 (2021), 45--57.Google ScholarDigital Library
- Zweben, S., Tims, J., Tucker, C., and Timanovsky, Y. ACM-NDC Study 2021--22: Tenth Annual Study of Non-Doctoral-Granting Departments in Computing. ACM Inroads, 13, 3 (2022), 38--54.Google Scholar
- Zweben, S., Tims, J., and Timanovsky, Y. ACM-NDC Study 2019--20: Eighth Annual Survey of Non-Doctoral-Granting Departments in Computing. ACM Inroads, 11, 3 (2020), 26--37.Google Scholar
- Zweben, S., Tims, J., Tucker, C. and Timanovsky, Y. ACM-NDC Study 2020--2021: Ninth Annual Survey of Non-Doctoral-Granting Departments in Computing. ACM Inroads, 12, 4 (2021), 30--44.Google ScholarDigital Library
- Zweben, S. Enrollment and Retention in U.S. Computer Science Bachelor's Programs in 2016--17. ACM Inroads, 10, 4 (2019), 47--59.Google ScholarDigital Library
Recommendations
Tree parity machine guided patients’ privileged based secure sharing of electronic medical record: cybersecurity for telehealth during COVID-19
AbstractIn the COVID-19 pandemic, telehealth plays a significant role in the e-healthcare. E-health security risks have also risen significantly with the rise in the use of telehealth. This paper addresses one of e-health’s key concerns, namely security. ...
Analysing Misinformation Sharing Amongst College Students in India During COVID-19
AbstractOver the last few years, social media has been increasingly used to share excessive amounts of information daily. With the growth of information sharing, unverified or false information (also termed as misinformation) is also being shared, which ...
Can a Public Blockchain Keep a Secret?
Theory of CryptographyAbstractBlockchains are gaining traction and acceptance, not just for cryptocurrencies, but increasingly as an architecture for distributed computing. In this work we seek solutions that allow a public blockchain to act as a trusted long-term repository ...
Comments