kth.sePublications
Change search
Link to record
Permanent link

Direct link
Publications (9 of 9) Show all publications
Jemstedt, A., Bälter, O., Gavel, A., Glassey, R. & Bosk, D. (2024). Less to produce and less to consume: the advantage of pure question-based learning. Interactive Learning Environments, 1-22
Open this publication in new window or tab >>Less to produce and less to consume: the advantage of pure question-based learning
Show others...
2024 (English)In: Interactive Learning Environments, ISSN 1049-4820, E-ISSN 1744-5191, p. 1-22Article in journal (Refereed) Epub ahead of print
Abstract [en]

This study is the first to investigate how an online course consisting solely of multiple-choice questions and detailed formative feedback comparesto an online course format that was previously shown to be highlyeffective. Specifically, a pure question-based learning (pQBL) version ofa course was compared to a question-based learning course (QBL)which consisted of the same questions and feedback as the pQBLcourse, but also included ordinary texts about the subject. To explorehow pQBL and QBL compared in terms of learning outcomes andcompletion time, 492 employees at the Swedish Employment Agencywere randomized to either a pQBL or a QBL version of a course aboutIT security. The results indicate that the pQBL course resulted in equallygood or better learning outcomes compared to the QBL course. Thisresult was robust to changes in how course quality was defined. Inaddition, participants completed the pQBL course slightly faster.Because a pQBL course requires less resources to produce, there arebenefits to relying on the pQBL method when teachers or studentshave limited time. Further benefits that come with the flexibility of thepQBL method are discussed

Place, publisher, year, edition, pages
Taylor & Francis Group, 2024
Keywords
Question-based learning, active learning, formativefeedback, doer effect
National Category
Educational Sciences
Research subject
Education and Communication in the Technological Sciences
Identifiers
urn:nbn:se:kth:diva-360341 (URN)10.1080/10494820.2024.2362830 (DOI)001247707400001 ()2-s2.0-85195687874 (Scopus ID)
Note

QC 20250225

Available from: 2025-02-25 Created: 2025-02-25 Last updated: 2025-02-25Bibliographically approved
Bälter, O., Glassey, R., Jemstedt, A. & Bosk, D. (2024). Pure Question-Based Learning. Education Sciences, 14(8), Article ID 882.
Open this publication in new window or tab >>Pure Question-Based Learning
2024 (English)In: Education Sciences, E-ISSN 2227-7102, Vol. 14, no 8, article id 882Article in journal (Refereed) Published
Abstract [en]

We have evaluated a new pedagogical approach, pure question-based learning, or rather, a modern, digitized version of a really old approach: the Socratic method of learning. The pedagogical approach was evaluated and improved using a design-based research methodology. An online course was developed with pure question-based learning to explain its predecessor: question-based learning. The course was successively taken by students, researchers, and practitioners, and discussed in four group seminars. Feedback from each iteration was integrated into the next version and the course is still in use, see link below. Results from the design-based research process were positive ((Formula presented.) participants, over four iterations) with the main negative results coming from the unfamiliarity of the format and feelings of exam-like stress during the first encounter. While pure question-based learning is new, it builds upon well-tested pedagogical methods. The method has several potential advantages: learning can be broken down into smaller modules, there is less passive learning for the students, less learning material needs to be created and AI could be used for this creation.

Place, publisher, year, edition, pages
MDPI AG, 2024
Keywords
active learning, effective learning, formative feedback, question-based learning
National Category
Educational Sciences
Identifiers
urn:nbn:se:kth:diva-353464 (URN)10.3390/educsci14080882 (DOI)001305456100001 ()2-s2.0-85202611902 (Scopus ID)
Note

QC 20240923

Available from: 2024-09-19 Created: 2024-09-19 Last updated: 2025-02-18Bibliographically approved
Snider, J., Bälter, O. & Bosk, D. (2023). Edit, Run, Error, Repeat: A Longitudinal Analysis of Time-on-Task and Error Quotient. In: Proceedings of 23rd International Conference on Computing Education Research, Koli Calling 2023: . Paper presented at 23rd International Conference on Computing Education Research, Koli Calling 2023, Hybrid, Koli, Finland, Nov 13 2023 - Nov 19 2023. Association for Computing Machinery (ACM), Article ID 3631849.
Open this publication in new window or tab >>Edit, Run, Error, Repeat: A Longitudinal Analysis of Time-on-Task and Error Quotient
2023 (English)In: Proceedings of 23rd International Conference on Computing Education Research, Koli Calling 2023, Association for Computing Machinery (ACM) , 2023, article id 3631849Conference paper, Published paper (Refereed)
Place, publisher, year, edition, pages
Association for Computing Machinery (ACM), 2023
Keywords
Computer Science Education, Error Quotient, Learning Analytics, Time-on-Task
National Category
Computer Sciences
Identifiers
urn:nbn:se:kth:diva-348442 (URN)10.1145/3631802.3631849 (DOI)2-s2.0-85185586638 (Scopus ID)
Conference
23rd International Conference on Computing Education Research, Koli Calling 2023, Hybrid, Koli, Finland, Nov 13 2023 - Nov 19 2023
Note

Part of ISBN 9798400716539

QC 20240625

Available from: 2024-06-25 Created: 2024-06-25 Last updated: 2024-06-25Bibliographically approved
Snider, J., Bälter, O. & Bosk, D. (2022). Learning in the Pandemic: How the possibility to play video games during class and attend lessons without getting out of bed affects time-on-task. In: IEEE Frontiers in Education Conference (FIE): . Paper presented at IEEE Frontiers in Education Conference (FIE), Uppsala, Sweden, 8-11 October 2022. Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Learning in the Pandemic: How the possibility to play video games during class and attend lessons without getting out of bed affects time-on-task
2022 (English)In: IEEE Frontiers in Education Conference (FIE), Institute of Electrical and Electronics Engineers (IEEE) , 2022Conference paper, Oral presentation with published abstract (Refereed)
Abstract [en]

This Innovate Practice work-in-progress paperpresents findings around how distance learning, due to the theCOVID-19 pandemic, affected students as measured by time-ontask in programming.In this qualitative study, we examine a group of 36 second yearupper-secondary students in Programming 1 during a nine weekperiod in Spring 2021. During this time, they alternated betweenone whole week of distance learning followed by two weeks of inschool instruction. For the Programming 1 lessons, students usedan online platform to write, edit and run code in. We analyzedthe log data from the platform to estimate time-on-task for eachstudent for every lesson both at home and at school.We observed that students were affected differently by distancelearning as measured by time-on-task. 12 students had moreaverage time-on-task at school. 15 students had more averagetime-on-task at home. Nine students had less than five minutesdifference on average.In addition to the analysis of time-on-task, students weregiven a survey in Fall 2021 to follow up on their experienceswith in-school teaching and distance learning. In the survey,students were asked questions about their study environment athome during distance learning. From the responses, 13 studentsdescribed their study environment as “in bed” despite having access to a table and chair in a room for themselves and twentythree students described their study environment as “playingvideo games during online lectures”. Not surprisingly, studentsthat said they were playing video games during online lectureshad a lower average time-on-task by about ten minutes than theirpeers. Interestingly, students that said they participated in classin bed had a higher average time-on-task by about ten minutesthan their peers.Correlating responses from the survey and time-on-task data,we reason about how students’ study environments at homeaffected their time-on-task and how distance learning has affectedstudents in the pandemic. 

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2022
National Category
Computer Sciences
Identifiers
urn:nbn:se:kth:diva-327848 (URN)10.1109/FIE56618.2022.9962404 (DOI)2-s2.0-85143757722 (Scopus ID)
Conference
IEEE Frontiers in Education Conference (FIE), Uppsala, Sweden, 8-11 October 2022
Note

QC 20230614

Available from: 2023-05-31 Created: 2023-05-31 Last updated: 2023-06-21Bibliographically approved
Bosk, D. & Glassey, R. (2021). When Flying Blind, Bring a Co-pilot: Informal Peer Observation and Cooperative Teaching during Remote Teaching. In: Annual Conference on Innovation and Technology in Computer Science Education, ITiCSE: . Paper presented at 26th ACM Conference on Innovation and Technology in Computer Science Education, ITiCSE 2021, 26 June 2021 through 1 July 2021 (pp. 611-612). Association for Computing Machinery (ACM)
Open this publication in new window or tab >>When Flying Blind, Bring a Co-pilot: Informal Peer Observation and Cooperative Teaching during Remote Teaching
2021 (English)In: Annual Conference on Innovation and Technology in Computer Science Education, ITiCSE, Association for Computing Machinery (ACM) , 2021, p. 611-612Conference paper, Published paper (Refereed)
Abstract [en]

The shift to meeting students online has made traditional forms of interaction difficult or impossible to replicate. In response, we suggest that teachers become co-pilots for each other: joining lectures and extending the abilities of a solo teacher. By doing so, there are clear and distinct benefits for students, the teacher, and the co-pilot, with almost no barrier to entry and very little preparation required. Whilst there is a time cost, we feel this is well spent and acts as a gateway to more established pedagogical practices, such as peer observation and cooperative teaching. 

Place, publisher, year, edition, pages
Association for Computing Machinery (ACM), 2021
Keywords
co-teaching, collaborative teaching, online teaching, Education computing, Engineering research, Students, Pedagogical practices, Remote teaching, Time cost, Engineering education
National Category
Pedagogy Didactics Pedagogical Work
Identifiers
urn:nbn:se:kth:diva-310146 (URN)10.1145/3456565.3460040 (DOI)2-s2.0-85108885806 (Scopus ID)
Conference
26th ACM Conference on Innovation and Technology in Computer Science Education, ITiCSE 2021, 26 June 2021 through 1 July 2021
Note

Part of proceedings: ISBN 978-1-4503-8397-4

QC 20220328

Available from: 2022-03-28 Created: 2022-03-28 Last updated: 2023-01-18Bibliographically approved
Bosk, D., Bouget, S. & Buchegger, S. (2020). Distance-bounding, privacy-preserving attribute-based credentials. In: 19th International Conference on Cryptology and Network Security, CANS 2020: . Paper presented at 14 December 2020 through 16 December 2020 (pp. 147-166). Springer Nature
Open this publication in new window or tab >>Distance-bounding, privacy-preserving attribute-based credentials
2020 (English)In: 19th International Conference on Cryptology and Network Security, CANS 2020, Springer Nature , 2020, p. 147-166Conference paper, Published paper (Refereed)
Abstract [en]

Distance-bounding anonymous credentials could be used for any location proofs that do not need to identify the prover and thus could make even notoriously invasive mechanisms such as location-based services privacy-preserving. There is, however, no secure distance-bounding protocol for general attribute-based anonymous credentials. Brands and Chaum’s (EUROCRYPT’93) protocol combining distance-bounding and Schnorr identification comes close, but does not fulfill the requirements of modern distance-bounding protocols. For that, we need a secure distance-bounding zero-knowledge proof-of-knowledge resisting mafia fraud, distance fraud, distance hijacking and terrorist fraud. Our approach is another attempt toward combining distance bounding and Schnorr to construct a distance-bounding zero-knowledge proof-of-knowledge. We construct such a protocol and prove it secure in the (extended) DFKO model for distance bounding. We also performed a symbolic verification of security properties needed for resisting these attacks, implemented in Tamarin. Encouraged by results from Singh et al. (NDSS’19), we take advantage of lessened constraints on how much can be sent in the fast phase of the distance-bounding protocol and achieve a more efficient protocol. We also provide a version that does not rely on being able to send more than one bit at a time which yields the same properties except for (full) terrorist fraud resistance.

Place, publisher, year, edition, pages
Springer Nature, 2020
Keywords
Cryptography, Location based services, Privacy by design, Telecommunication services, Terrorism, Anonymous credential, Distance bounding protocols, Efficient protocols, General attributes, Privacy preserving, Security properties, Symbolic verification, Zero knowledge proof, Network security
National Category
Computer Sciences
Identifiers
urn:nbn:se:kth:diva-302925 (URN)10.1007/978-3-030-65411-5_8 (DOI)000916416900008 ()2-s2.0-85098261202 (Scopus ID)
Conference
14 December 2020 through 16 December 2020
Note

QC 20211001

Available from: 2021-10-01 Created: 2021-10-01 Last updated: 2024-01-10Bibliographically approved
Bosk, D., Rodríguez-Cano, G., Greschbach, B. & Buchegger, S. (2018). Applying privacy-enhancing technologies: One alternative future of protests. In: Protests in the Information Age: Social Movements, Digital Practices and Surveillance (pp. 73-94). Taylor & Francis
Open this publication in new window or tab >>Applying privacy-enhancing technologies: One alternative future of protests
2018 (English)In: Protests in the Information Age: Social Movements, Digital Practices and Surveillance, Taylor & Francis, 2018, p. 73-94Chapter in book (Refereed)
Abstract [en]

While current technologies, such as online social networks, can facilitate coordination and communication for protest organization, they can also endanger political activists when the control over their data is ceded to third parties. For technology to be useful for activism, it needs to be trustworthy and protect the users’ privacy; only then can it be viewed as a potential improvement over more traditional, offline methods. Here, we discuss a selection of such privacy-enhancing technologies from a Computer Science perspective in an effort to open a dialogue and elicit input from other perspectives.

Place, publisher, year, edition, pages
Taylor & Francis, 2018
National Category
Information Systems, Social aspects
Identifiers
urn:nbn:se:kth:diva-238371 (URN)2-s2.0-85047568798 (Scopus ID)
Note

QC 20241112

Part of ISBN 9781351815437; 9780415791403

Available from: 2018-11-19 Created: 2018-11-19 Last updated: 2025-02-17Bibliographically approved
Bosk, D. & Buchegger, S. (2016). Privacy-preserving access control in publicly readable storage systems. In: 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, 2015: . Paper presented at 16 August 2015 through 21 August 2015 (pp. 327-342). Springer-Verlag New York
Open this publication in new window or tab >>Privacy-preserving access control in publicly readable storage systems
2016 (English)In: 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, 2015, Springer-Verlag New York, 2016, p. 327-342Conference paper, Published paper (Refereed)
Abstract [en]

In this paper, we focus on achieving privacy-preserving access control mechanisms for decentralized storage, primarily intended for an asynchronous message passing setting. We propose two modular constructions, one using a pull strategy and the other a push strategy for sharing data. These models yield different privacy properties and requirements on the underlying system. We achieve hidden policies, hidden credentials and hidden decisions. We additionally achieve what could be called ‘hidden policy-updates’, meaning that previously-authorized subjects cannot determine if they have been excluded from future updates or not.

Place, publisher, year, edition, pages
Springer-Verlag New York, 2016
Keywords
Access control, Cloud storage, Decentralized storage, Hidden credentials, Hidden policies, Hidden policy-updates, Privacy, Data privacy, Digital storage, Education, Message passing, Modular construction, Access control mechanism, Cloud storages, Hidden decisions, Message-passing settings, Privacy preserving, Underlying systems
National Category
Computer Systems
Identifiers
urn:nbn:se:kth:diva-195519 (URN)10.1007/978-3-319-41763-9_22 (DOI)2-s2.0-84979210041 (Scopus ID)9783319417622 (ISBN)
Conference
16 August 2015 through 21 August 2015
Note

QC 20161114

Available from: 2016-11-14 Created: 2016-11-03 Last updated: 2022-06-27Bibliographically approved
Bosk, D., Kjellqvist, M. & Buchegger, S. (2015). Towards Perfectly Secure and Deniable Communication Using an NFC-Based Key-Exchange Scheme. In: Sonja Buchegger; Mads Dam (Ed.), Secure IT Systems: 20th Nordic Conference NordSec 2015. Paper presented at 20th Nordic Conference NordSec 2015 (pp. 72-87). Springer, 9417
Open this publication in new window or tab >>Towards Perfectly Secure and Deniable Communication Using an NFC-Based Key-Exchange Scheme
2015 (English)In: Secure IT Systems: 20th Nordic Conference NordSec 2015 / [ed] Sonja Buchegger; Mads Dam, Springer, 2015, Vol. 9417, p. 72-87Conference paper, Published paper (Refereed)
Abstract [en]

In this paper we first analyse the possibility for deniability under a strong adversary, who has an Internet-wide transcript of the communication. Secondly, we present a scheme which provides the desirable properties of previous messaging schemes, but with stronger deniability under the new adversary model. Our scheme requires physical meetings for exchanges of large amounts of random key-material via near-field communication and later uses this random data to key a one-time pad for text-messaging. We prove the correctness of the protocol and, finally, we evaluate the practical feasibility of the suggested scheme.

Place, publisher, year, edition, pages
Springer, 2015
Series
Lecture Notes in Computer Science
Keywords
Deniability, Deniable encryption, Authenticated encryption, Perfect secrecy, Off-the-record, Key-exchange, Nearfield communication, Surveillance
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kth:diva-178981 (URN)10.1007/978-3-319-26502-5_6 (DOI)000374098500006 ()2-s2.0-84951873415 (Scopus ID)
Conference
20th Nordic Conference NordSec 2015
Funder
Swedish Foundation for Strategic Research , FFL09-0086Swedish Research Council, 2009-3793
Note

QC 20160208

Available from: 2016-01-11 Created: 2015-12-09 Last updated: 2022-06-23Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0003-3865-212X

Search in DiVA

Show all publications