consortium for computing sciences in colleges : central plains
Information for Authors
Thank you for considering a submission to CCSC:CP, our conference will be all the better for your participation. We welcome papers, panels/tutorials, nifty assignments, lightning talks, student papers and posters.
Submission to our conference is an easy 3-step process.
1. Develop your paper/panel/tutorial/nifty assignments/lightning talks proposal (OK, step 1 might admittedly be a little challenging)
2. Visit our submission guidelines page to ensure that your manuscript is properly formatted
3. Submit your paper/panel/etc at our new submission portal.
We invite professionals to submit papers that will enhance knowledge of academic computing topics. All topics will be considered and those papers that are accepted will be presented at the conference and published in the Journal of Computing Sciences in Colleges and the ACM Digital Library. Papers must be submitted on or before 11/30/2015. Authors will be notified by 1/6/2016, and final submissions must be made by 1/13/2016. Contact Scott Bell, Yipkei Kwok or David Heise for specific information.
Panels and Tutorials
We invite professionals to submit abstracts describing panels and tutorials related to academic computing topics which they believe conference attendees will find timely. All topics will be considered; those that are accepted will be presented at the conference and their abstracts published in the conference proceedings. Panel and tutorial abstracts must be submitted on or before 11/30/2015. Authors will be notified by 1/6/2016, and final submissions must be made by 1/13/2016. Contact Ron McCleary or Anshuman Singh for specific information.
We invite instructors to submit abstracts describing "nifty" course assignments they believe conference attendees will find useful and incorporate in their courses. All topics will be considered; those that are accepted will be presented at the conference and their abstracts published in the conference proceedings. "Nifty" course assignment abstracts must be submitted 11/30/2015. Authors will be notified by 1/6/2016, and final submissions must be made by 1/13/2016. Contact Mahmoud Yousef, Michael Haas or Michael Rogers for specific information.
We invite conference participants to submit proposals for “Lightning Talks” on topics that might be interesting to attendees. These will be quick (5-10 minutes) presentations, less formal than those for papers, and they will not be peer reviewed or published. The conference committee will accept proposals of general interest to fit the allotted time slots. The acceptance notifications will indicate time limit. To submit, send a title and an abstract of no more than four sentences to Rick Barker or Scott Sigman by 3/11/2016
K-12 Teacher Submissions
The 2016 Central Plains Regional Conference of the CCSC will feature a track for K-12 teachers. All K-12 educators are encouraged to submit a paper, tutorial, workshop, panel proposal, nifty assignment or lightning talk (see the descriptions above) for consideration. Contact Diana Linville, Tim DeClue, Lisa Perkins or Robin Robertson for details.
We invite students to submit paper proposals on any computing topic believed to be of interest to attendees. While student Papers are neither peer reviewed nor published, abstracts of selected papers will be posted on the conference web site (the abstract for the best student paper in 2015 may be found here, for example), and certificates will be given for the best papers. Papers must be submitted by 3/11/2016. Authors of accepted papers will be provided with feedback before their presentation, so they can adjust accordingly. Contact Linda Webster, Scott Sigman or Ajay Bandi for further information.
Student Poster Contest
We invite students to submit abstracts on any topic in computing for a poster contest to be held at the conference. Posters are due on 3/11/2016. Send the title, abstract, list of authors (include year [Fr,So,Jr,Sr,Grad]), faculty mentor name, and the complete name and location of your school as attachments to email@example.com. Interested students should contact Rick Barker for specific information.
Notes for Accepted Authors
1. Information on formatting details and instructions on submission procedures, for all of the categories below, is now available. If your work is accepted, you will be cordially requested to fill out a Copyright Release form (see the Authors Acceptance letter for details).
2. Only those works that are presented at the conference will appear in the ACM digital library.
Michael Harris, UMKC
Teaching students the inner workings of malicious software has been a contentious issue in the past. It has been viewed as dangerous, as a fundamental threat to data security. However, the security industry is rapidly growing. This expansion brings a need for new minds bringing fresh insights into how information systems are to be protected or potentially attacked. It is time to reconsider the current consensus on malicious software in higher education in order to better protect the computing industry and create better software.