Asee peer logo
Displaying all 17 results
Conference Session
Security
Collection
2006 Annual Conference & Exposition
Authors
Mario Garcia, Texas A&M University-Corpus Christi
Tagged Divisions
Information Systems
Acceptance Rates) and extremely low 0.2%FRR (False Rejection Rates).Keystroke BiometricsKeystroke Recognition is completely a software-based solution. It involves two processes: 1. Enrollment Process: This process will enroll the user and generate a template for him/her. To start with, the individual must type in a specific word or a phrase or a set of alphanumeric characters. This is usually a username and password. 2. Verification Process: This process will verify an enrolled individual to confirm the identification of the person. It will match the current template with an existing one for authentication purposes 7
Conference Session
Security
Collection
2006 Annual Conference & Exposition
Authors
Mario Garcia, Texas A&M University-Corpus Christi
Tagged Divisions
Information Systems
available today which allow system administrators to assess the strength of theirpasswords in order to take the necessary precautions. The purpose of this report is to conduct astudy of how well some of the more popular password auditing applications perform forWindows and UNIX operating systems.IntroductionThe three basic components of computer security are confidentiality, integrity, and availability.To ensure the integrity of a system, prevention and detection mechanisms are used to handleimproper or unauthorized change. Prevention mechanisms specifically seek to maintain integrityby blocking any unauthorized attempts to access or change the data in a system 1. Authentication,also known as origin integrity, is the binding of an identity to a
Conference Session
Computing Curriculum
Collection
2006 Annual Conference & Exposition
Authors
Barry Lunt, Brigham Young University; Joseph Ekstrom, Brigham Young University
Tagged Divisions
Information Systems
discussion of all computing programs, we chose tofocus on the five computing disciplines that have formally-defined curricula, as outlined by theACM (Association for Computing Machinery), and as available at the ACM website(http://www.acm.org/education/curricula.html). These computing programs, as outlined above, Page 11.320.3are: computer engineering (CpE), computer science (CS), information systems (IS), informationtechnology (IT), and software engineering (SE).In an effort to understand the relationship between these computing programs, other papers havebeen written.1, 2, 3, 4 The authors recommend these reports where additional depth is
Conference Session
Computing Curriculum
Collection
2006 Annual Conference & Exposition
Authors
Michael Bailey, Brigham Young University; Barry Lunt, Brigham Young University; Gordon Romney, Brigham Young University
Tagged Divisions
Information Systems
Library Physics Chemistry Business / Statistics Engineering Science Computer Engineering Computer Software Science Engineering Information Systems Information TechnologyFigure 1. Overall trends in the antecedents of the programs, as gleaned from various historicalsources.ChronologyIn the beginning was Mathematics; and it was good
Conference Session
Internet and Distributed Computing
Collection
2006 Annual Conference & Exposition
Authors
Philip Lunsford, East Carolina University; Lee Toderick, East Carolina University; Daniel Brooker, East Carolina University
Tagged Divisions
Information Systems
want to compromisethose resources. Thus the importance of teaching students the basics of information Page 11.110.2security and the more general information assurance topics has become a necessity incurriculum related to computer information systems. Some curricula have allowed for in-depth study of these topics. However, the advancement of distance education (DE) hasprovided challenges to teaching these topics.As discussed by Frincke [1], the teaching philosophies for information assuranceeducators can be divided into two camps: defense assurance and attack understanding.Defense assurance focuses on the mechanisms to provide defenses to a system
Conference Session
Computing Curriculum
Collection
2006 Annual Conference & Exposition
Authors
Alan Price, DeVry University-Pomona
Tagged Divisions
Information Systems
educational system 1, questions to whetherhypermedia learning environments can be designed to be effective and efficient for differentkinds of learning objectives are still unanswered 2. Hypermedia environments, characterized asthe inclusion of hypertext with additional multimedia artifacts, have three problems when used tosupport learning: user distraction due to the large amount of information in the hyperspace,spatial disorientation due to the user not knowing where they are in the hyperspace, andcognitive overload when a user is confronted with high memory demands 2. The first twoproblems deal with the information retrieval process and the third problem is related to humaninformation acquisition. To overcome the problems associated with
Conference Session
Computing Curriculum
Collection
2006 Annual Conference & Exposition
Authors
Akram Al-Rawi, Zayed University; Azzedine Lansari, Zayed University; Faouzi Bouslama, Zayed University
Tagged Divisions
Information Systems
each topic. The syllabus also includes all course assessments, which include passing thecertification exam in order to complete the course. It is anticipated that this study will helpstudents, faculty, and college administrators determine the proper networking certificate for theirundergraduate program and help instructors integrate the chosen certificate into their courses.1. IntroductionCertification establishes a standard of competency in specific area and job roles.1,2,3 This helpsindustry to determine that employees meet the required credentials for different jobs roles thus Page 11.787.2requiring less training during the initial
Conference Session
DB & Information Integration
Collection
2006 Annual Conference & Exposition
Authors
Ed Crowley, University of Houston; Cheryl Willis, University of Houston
Tagged Divisions
Information Systems
would normally require substantially greater budget andsupport resources.Live CDs and Open Source Tools: Elements of SuccessFour years ago, when we began to develop our security courses, we soon realized that we hadneither the time nor the resources required for a conventional development process. We alsoknew that hands-on activities would be critical. As an analysis of the structure of hands-onactivities, Jeanna Matthews1 has observed: Nearly all (laboratory activities) involve three parts: 1. Configuring the hardware and software to prepare for a networking experiment (e.g. connecting a series of machines with routers, hubs of switches, configuring the machines with hard coded IP address, etc.) 2. Performing an experiment to
Conference Session
DB & Information Integration
Collection
2006 Annual Conference & Exposition
Authors
Ronald Glotzbach, Purdue University; Nathan Bingham, Purdue University; Meiqi Ren, Purdue University; Dorina Mordkovich, Purdue University
Tagged Divisions
Information Systems
-Stadium couldeasily translate into other communication areas where a mix of real-time and stored informationwould enhance an information space or an experience. The e-Stadium application (see Figure 1) is written in ASP.NET using C# with a SQL Server relational database. The adaptive rendering capabilities of ASP.NET Mobile Forms, which supports over 200 different handheld devices from a single application, are used to deliver content to handheld devices. As a game progresses, statisticians generate an XML document containing individual plays, statistics, drive
Conference Session
Internet and Distributed Computing
Collection
2006 Annual Conference & Exposition
Authors
Fani Zlatarova, Elizabethtown College
Tagged Divisions
Information Systems
implementation. Animportant role is assigned to the database query definition, because answering queries is the finalgoal of an information system. Teaching different levels of abstractions and the respectivestrategies for query definition, such as: natural language descriptions, relational algebraexpressions, QBE relational language expressions, SQL language expressions, queryoptimization tools, and miscellaneous recent query applications, would prepare our students forefficient and effective management of information systems.1. IntroductionCurrently, using information systems is part of the daily activities of the global economic, social,and political environments. Many academic institutions introduce new graduate interdisciplinaryprograms involving a
Conference Session
Security
Collection
2006 Annual Conference & Exposition
Authors
Tim Lin, California State Polytechnic University-Pomona; Saeed Monemi, California State Polytechnic University-Pomona
Tagged Divisions
Information Systems
component. For example, C /C++ programming course was enhanced with basic ciphering like Caeasr cipher, Javaprogramming was enhanced with Java security concepts, OS course was enhanced with thecoverage of access control, buffer overflow, malicious software, etc., network course wasenhanced with the coverage of insecure protocol and secure protocol etc. The author will discusshow security education can be enhanced in many college courses below.1. IntroductionWhether caused by so many news worthy security incidents or not, security education hasbecome a trend either as a major, a certificate program, a curriculum, or as modules to enhancethe current curriculum nowadays.Security education papersIt was worth noting that security education is noted and
Conference Session
Computing Curriculum
Collection
2006 Annual Conference & Exposition
Authors
Frank Kowalkowski, Knowledge Consultants; Gilbert Laware, Purdue University
Tagged Divisions
Information Systems
ever-increasing need for critical assessment ofenterprise problems which demands a different set of analytic and problem-solving skills to Page 11.1200.2assess those requirements. It also requires chaining different types of requirements together. Intoday’s market, it is essential to react to a business situation by (1) formulating the problem, (2)analyzing the problem, (3) searching for solutions, (4) deciding upon an appropriate solution, and(5) specifying the solution. Of course, this approach to analysis has to be accomplished on timeand within budget, and produce high quality results. Many organizations realize that gatheringand
Conference Session
Internet and Distributed Computing
Collection
2006 Annual Conference & Exposition
Authors
Xiannong Meng, Bucknell University; Luiz Perrone, Bucknell University; Maurice Aburdene, Bucknell University
Tagged Divisions
Information Systems
to write programs in a C-like programming language on personalcomputers using Windows or Linux. Once the software is developed and tested, it can bedownloaded to the Cybiko device. Other software and games can be downloaded to the deviceusing CyberLoad software. The project implements a simplified version of the 802.11 MAClayer on the Cybiko.15 The physical layer emulation, equivalent to that of the 802.11 standard,is given to the students, who are then asked to implement a set of well-defined MAC layerinterfaces on top of the physical layer interface, so that the application programs may use the setof MAC interface directly. Figure 1 illustrates the concept of the project. 802.11 MAC emulation project (students
Conference Session
Internet and Distributed Computing
Collection
2006 Annual Conference & Exposition
Authors
Shelton Houston, University of Southern Mississippi; Christopher Herrod, University of Southern Mississippi; Steven Blesse, University of Southern Mississippi
Tagged Divisions
Information Systems
. The networktopology for the facility had to be highly configurable to support multiple networkconfigurations. Figure 1 shows the design of the facility network topology using managedswitches and Inter-VLAN routing.BackgroundOther constraints that impacted the program were vendor specific courses that had to bearticulated. Specifically, the Cisco Networking Academy Program (CNAP) had to bearticulated with eight different community colleges in the state. In addition to a fourcourse sequence offered at the community colleges, an additional four course sequencewas required because the four-year IT program included the Cisco Certified NetworkProfessional (CCNP) program. Seven out of eight Cisco courses required use of thefacility. Since Cisco
Conference Session
Security
Collection
2006 Annual Conference & Exposition
Authors
Yu Cai, Michigan Technological University; Guy Hembroff, Michigan Technological University
Tagged Divisions
Information Systems
hands-on experience onInternet security, especially DDoS attack, detection and defense mechanisms.1. IntroductionNetwork security is a topic gaining tremendous interests in today’s Information Technologyworld. The increasing frequency and severity of network attacks in recent years reveal somefundamental security issues of Internet environment. Significant efforts from university andindustry have been made to improve computer and network security. It is vital to incorporatethe latest research results in higher education and academic programs to provide training andeducation to college students and cyber security professionals.College seniors in Computer Network & System Administration (CNSA) program [1] atMichigan Technological University
Conference Session
DB & Information Integration
Collection
2006 Annual Conference & Exposition
Authors
Reza Sanati-Mehrizy; Curtis Welborn, Utah Valley State College; Afsaneh Minaie, Utah Valley State College
Tagged Divisions
Information Systems
example that will be improved gradually through the paper.Capturing Business RulesFigure 1 is an Entity Relationship Diagram that depicts the following information about airplanemechanics. A mechanic is an individual with skills that allows him to maintain airplanes. Amechanic must receive specific types of training related to maintaining airplanes. There aremany different types of training that a mechanic can receive for maintaining airplanes, such astraining on landing gear, training on engines, training on electronics, and so on. In turn, thetypes of training that a mechanic receives are used to determine the types of maintenanceservices that the mechanic can perform on an airplane. A specific maintenance service mayrequire that a mechanic
Conference Session
DB & Information Integration
Collection
2006 Annual Conference & Exposition
Authors
Phillip Wilson, Texas A&M University-Corpus Christi; John Fernandez, Texas A&M University-Corpus Christi
Tagged Divisions
Information Systems
state of the individual at thetime of the assessment. This E-Quality score is computed as the difference between theaverage of the pleasant emotions (happiness, interest and surprise) and the average of theunpleasant emotions (contempt, disgust, shame, fear, anger, distress, sadness andanxiety). The difference is then recalibrated to range from +100 to -100. The result is ameasure that reflects a more satisfying overall emotional state as the measure approaches Page 11.919.3+100 and an increasingly uncomfortable state as the score approaches -100. In addition,the Emogram results for each emotion can range from a low value of one (1) to a highscore of