{"id":"https://openalex.org/W7117356745","doi":"https://doi.org/10.1145/3769694.3771154","title":"Expanding Pedagogical AI Scaffolding to IT and Cybersecurity Education: A Call for Multi-Institutional Validation","display_name":"Expanding Pedagogical AI Scaffolding to IT and Cybersecurity Education: A Call for Multi-Institutional Validation","publication_year":2025,"publication_date":"2025-11-06","ids":{"openalex":"https://openalex.org/W7117356745","doi":"https://doi.org/10.1145/3769694.3771154"},"language":null,"primary_location":{"id":"doi:10.1145/3769694.3771154","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3769694.3771154","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 26th ACM Annual Conference on Cybersecurity &amp; Information Technology Education","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5082980045","display_name":"Lucas Cordova","orcid":null},"institutions":[{"id":"https://openalex.org/I141670070","display_name":"Willamette University","ror":"https://ror.org/04g9e0f44","country_code":"US","type":"education","lineage":["https://openalex.org/I141670070"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Lucas P. Cordova","raw_affiliation_strings":["Computer Science, Willamette University, Salem, OR, USA"],"affiliations":[{"raw_affiliation_string":"Computer Science, Willamette University, Salem, OR, USA","institution_ids":["https://openalex.org/I141670070"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121366529","display_name":"Teo Mendoza","orcid":null},"institutions":[{"id":"https://openalex.org/I141670070","display_name":"Willamette University","ror":"https://ror.org/04g9e0f44","country_code":"US","type":"education","lineage":["https://openalex.org/I141670070"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Teo Mendoza","raw_affiliation_strings":["Willamette University, Salem, USA"],"affiliations":[{"raw_affiliation_string":"Willamette University, Salem, USA","institution_ids":["https://openalex.org/I141670070"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121396906","display_name":"Ben Webster","orcid":null},"institutions":[{"id":"https://openalex.org/I141670070","display_name":"Willamette University","ror":"https://ror.org/04g9e0f44","country_code":"US","type":"education","lineage":["https://openalex.org/I141670070"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ben Webster","raw_affiliation_strings":["Willamette University, Salem, USA"],"affiliations":[{"raw_affiliation_string":"Willamette University, Salem, USA","institution_ids":["https://openalex.org/I141670070"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121379118","display_name":"Andrew Logan Sanders","orcid":null},"institutions":[{"id":"https://openalex.org/I4210087454","display_name":"Augusta University Health","ror":"https://ror.org/007rawr89","country_code":"US","type":"healthcare","lineage":["https://openalex.org/I4210087454"]},{"id":"https://openalex.org/I25041050","display_name":"Augusta University","ror":"https://ror.org/012mef835","country_code":"US","type":"education","lineage":["https://openalex.org/I25041050"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Andrew Logan Sanders","raw_affiliation_strings":["Computer and Cyber Sciences, Augusta University, Augusta, GA, USA"],"affiliations":[{"raw_affiliation_string":"Computer and Cyber Sciences, Augusta University, Augusta, GA, USA","institution_ids":["https://openalex.org/I4210087454","https://openalex.org/I25041050"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5004483487","display_name":"Gursimran Walia","orcid":"https://orcid.org/0000-0002-4029-6227"},"institutions":[{"id":"https://openalex.org/I25041050","display_name":"Augusta University","ror":"https://ror.org/012mef835","country_code":"US","type":"education","lineage":["https://openalex.org/I25041050"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Gursimran Walia","raw_affiliation_strings":["Augusta University, Augusta, USA"],"affiliations":[{"raw_affiliation_string":"Augusta University, Augusta, USA","institution_ids":["https://openalex.org/I25041050"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5082980045"],"corresponding_institution_ids":["https://openalex.org/I141670070"],"apc_list":null,"apc_paid":null,"fwci":0.6575,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.81630158,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"305","last_page":"306"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11636","display_name":"Artificial Intelligence in Healthcare and Education","score":0.1965000033378601,"subfield":{"id":"https://openalex.org/subfields/2718","display_name":"Health Informatics"},"field":{"id":"https://openalex.org/fields/27","display_name":"Medicine"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}},"topics":[{"id":"https://openalex.org/T11636","display_name":"Artificial Intelligence in Healthcare and Education","score":0.1965000033378601,"subfield":{"id":"https://openalex.org/subfields/2718","display_name":"Health Informatics"},"field":{"id":"https://openalex.org/fields/27","display_name":"Medicine"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}},{"id":"https://openalex.org/T10533","display_name":"Teaching and Learning Programming","score":0.13089999556541443,"subfield":{"id":"https://openalex.org/subfields/1706","display_name":"Computer Science Applications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.06639999896287918,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/metacognition","display_name":"Metacognition","score":0.6111999750137329},{"id":"https://openalex.org/keywords/documentation","display_name":"Documentation","score":0.5932000279426575},{"id":"https://openalex.org/keywords/scaffold","display_name":"Scaffold","score":0.35010001063346863},{"id":"https://openalex.org/keywords/component","display_name":"Component (thermodynamics)","score":0.3197000026702881},{"id":"https://openalex.org/keywords/conceptual-framework","display_name":"Conceptual framework","score":0.29179999232292175},{"id":"https://openalex.org/keywords/task-analysis","display_name":"Task analysis","score":0.27720001339912415},{"id":"https://openalex.org/keywords/educational-technology","display_name":"Educational technology","score":0.2759999930858612}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6258999705314636},{"id":"https://openalex.org/C118147538","wikidata":"https://www.wikidata.org/wiki/Q1126970","display_name":"Metacognition","level":3,"score":0.6111999750137329},{"id":"https://openalex.org/C56666940","wikidata":"https://www.wikidata.org/wiki/Q788790","display_name":"Documentation","level":2,"score":0.5932000279426575},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3702999949455261},{"id":"https://openalex.org/C89429830","wikidata":"https://www.wikidata.org/wiki/Q735710","display_name":"Scaffold","level":2,"score":0.35010001063346863},{"id":"https://openalex.org/C168167062","wikidata":"https://www.wikidata.org/wiki/Q1117970","display_name":"Component (thermodynamics)","level":2,"score":0.3197000026702881},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3082999885082245},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3025999963283539},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.3012000024318695},{"id":"https://openalex.org/C14224292","wikidata":"https://www.wikidata.org/wiki/Q13600188","display_name":"Conceptual framework","level":2,"score":0.29179999232292175},{"id":"https://openalex.org/C145420912","wikidata":"https://www.wikidata.org/wiki/Q853077","display_name":"Mathematics education","level":1,"score":0.29159998893737793},{"id":"https://openalex.org/C175154964","wikidata":"https://www.wikidata.org/wiki/Q380077","display_name":"Task analysis","level":3,"score":0.27720001339912415},{"id":"https://openalex.org/C16443162","wikidata":"https://www.wikidata.org/wiki/Q1068473","display_name":"Educational technology","level":2,"score":0.2759999930858612},{"id":"https://openalex.org/C13606891","wikidata":"https://www.wikidata.org/wiki/Q2623243","display_name":"Conceptual model","level":2,"score":0.2653999924659729},{"id":"https://openalex.org/C92393732","wikidata":"https://www.wikidata.org/wiki/Q1790374","display_name":"Learning theory","level":2,"score":0.2653999924659729},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.26409998536109924},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.2612999975681305},{"id":"https://openalex.org/C5041995","wikidata":"https://www.wikidata.org/wiki/Q853745","display_name":"Engineering education","level":2,"score":0.26080000400543213},{"id":"https://openalex.org/C133281099","wikidata":"https://www.wikidata.org/wiki/Q1783023","display_name":"Constructivism (international relations)","level":4,"score":0.2605000138282776},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.25049999356269836}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3769694.3771154","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3769694.3771154","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 26th ACM Annual Conference on Cybersecurity &amp; Information Technology Education","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"While":[0],"large":[1],"language":[2],"models":[3],"have":[4],"rapidly":[5],"infiltrated":[6],"technical":[7],"education,":[8],"evidence":[9],"suggests":[10],"their":[11],"pedagogical":[12,134],"impact":[13],"depends":[14],"critically":[15],"on":[16],"how":[17,133],"they":[18],"are":[19],"structured":[20,96],"and":[21,31,37,76,85,91,103,123,145],"integrated":[22],"into":[23,41],"learning":[24,138],"workflows.":[25],"We":[26,79],"present":[27],"Pedalogical,":[28],"a":[29],"framework":[30,88],"platform":[32],"for":[33],"embedding":[34],"metacognitive":[35,108],"scaffolding":[36,120],"Feynman":[38],"Technique-inspired":[39],"prompts":[40],"AI":[42,135],"assistants.":[43],"In":[44],"preliminary":[45],"studies":[46,131],"within":[47],"Data":[48],"Structures":[49],"courses,":[50],"students":[51],"using":[52,59],"our":[53,119],"pedagogically-structured":[54],"tool":[55],"significantly":[56],"outperformed":[57],"peers":[58],"unstructured":[60],"ChatGPT":[61],"(mean":[62],"scores:":[63],"92.7":[64],"vs.":[65],"74.3,":[66],"p":[67],"<":[68],"0.001),":[69],"with":[70],"greatest":[71],"gains":[72],"in":[73,128,140],"conceptual":[74],"reasoning":[75,97],"documentation":[77],"quality.":[78],"now":[80],"seek":[81],"collaborators":[82],"to":[83,89,126],"validate":[84],"extend":[86],"this":[87],"IT":[90],"cybersecurity":[92],"education":[93],"contexts,":[94],"where":[95],"about":[98],"system":[99],"vulnerabilities,":[100],"threat":[101],"modeling,":[102],"security":[104,141],"trade-offs":[105],"demands":[106],"similar":[107],"awareness.":[109],"This":[110],"lightning":[111],"talk":[112],"will":[113],"demonstrate":[114],"the":[115],"Pedalogical":[116],"platform,":[117],"share":[118],"design":[121,136],"patterns,":[122],"invite":[124],"institutions":[125],"participate":[127],"multi-site":[129],"validation":[130],"exploring":[132],"impacts":[137],"outcomes":[139],"analysis,":[142],"network":[143],"troubleshooting,":[144],"incident":[146],"response":[147],"scenarios.":[148]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-12-27T23:12:19.206068","created_date":"2025-12-27T00:00:00"}
