Teaching methods are erroneous: approaches which lead to erroneous end-user computing

نویسندگان

  • Maria Csernoch
  • Piroska Biró
چکیده

If spreadsheets are not erroneous then who, or what, is? Research has found that end-users are. If end-users are erroneous then why they are? Research has found that responsibility lies with human beings’ fast and slow thinking modes and the inappropriate way they use them. If we are aware of this peculiarity of human thinking, then why do we not teach students how to train their brains? This is the main problem, this is the weakest link in the process; teaching. We have to make teachers realize that end-users are erroneous because of the erroneous teaching approaches to end-user computing. The proportion of fast and slow thinking modes is not constant, and teachers are mistaken when they apply the same proportion in both the teaching and end-user roles. Teachers should believe in the incremental nature of science and have high self-efficacy to make students understand and appreciate science. This is not currently the case in ICT and CS, and it is high time fundamental changes were introduced.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Prototyping and Evaluation of Hospital Dashboard through End-User Computing Satisfaction Model (EUCS)

In today's competitive environment, one of the new tools in the field ofinformation technology is business or organizational dashboards that are as abackup in the process of strategic management of organizations. The aim ofthis study is building a prototype of a hospital dashboard on the principles andguidelines of dashboards and evaluating it based on End UserComputing Satisfaction (EUCS). The...

متن کامل

An approach to fault detection and correction in design of systems using of Turbo ‎codes‎

We present an approach to design of fault tolerant computing systems. In this paper, a technique is employed that enable the combination of several codes, in order to obtain flexibility in the design of error correcting codes. Code combining techniques are very effective, which one of these codes are turbo codes. The Algorithm-based fault tolerance techniques that to detect errors rely on the c...

متن کامل

A social recommender system based on matrix factorization considering dynamics of user preferences

With the expansion of social networks, the use of recommender systems in these networks has attracted considerable attention. Recommender systems have become an important tool for alleviating the information that overload problem of users by providing personalized recommendations to a user who might like based on past preferences or observed behavior about one or various items. In these systems...

متن کامل

See No Evil, Hear No Evil, Feel No Evil, Print No Evil? Malicious Fill Patterns Detection in Additive Manufacturing

Additive Manufacturing is an increasingly integral part of industrial manufacturing. Safety-critical products, such as medical prostheses and parts for aerospace and automotive industries are being printed by additive manufacturing methods with no standard means of verification. In this paper, we develop a scheme of verification and intrusion detection that is independent of the printer firmwar...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1704.01130  شماره 

صفحات  -

تاریخ انتشار 2017