- Conference Session
- Computing Curriculum
- Collection
- 2006 Annual Conference & Exposition
- Authors
-
Barry Lunt, Brigham Young University; Joseph Ekstrom, Brigham Young University
- Tagged Divisions
-
Information Systems
information management (DB) information systems development intelligent systems (AI) legal/professional/ethics/society networks operating systems programming security software life cycle systems administration
- Conference Session
- Security
- Collection
- 2006 Annual Conference & Exposition
- Authors
-
Tim Lin, California State Polytechnic University-Pomona; Saeed Monemi, California State Polytechnic University-Pomona
- Tagged Divisions
-
Information Systems
impacts. Have the common sense and knowthe basic procedures to protect the computer from the general attacks. Able to perceive if somesecurity of the computer is compromised.Stage 2: Hands On Capabilities and Experience: able to use the tools, emulate attacks ordefenses, develop software / devices for attack / defense.Stage 3: Professionalism: know the different issues of security such as legal, social, economic,ethical, etc., achieve the technical level of professionals, pursue a career in this profession,conduct professionally (ethically, such as ethical hacking).Most books or courses on security education cover stage 1: statement of knowledge which makesthe students aware of the security issues. It is good for the students to achieve stage 2
- Conference Session
- Internet and Distributed Computing
- Collection
- 2006 Annual Conference & Exposition
- Authors
-
Shelton Houston, University of Southern Mississippi; Christopher Herrod, University of Southern Mississippi; Steven Blesse, University of Southern Mississippi
- Tagged Divisions
-
Information Systems
faculty decided to limit use of the CNLSsystem to one course for the spring 2005 semester. This would permit faculty time toconfigure the system and test the operation on a pilot class before widespread operationwas implemented.The pilot class selected was the fifth of the CCNP sequence. Fifteen students participatedin the pilot class and had the option of using the CNLS system or laboratory equipment.Few restrictions were implemented in the management software since it was a smallgroup and because the software package was new to the faculty. It was assumed thatstudents would be ethical in using the system and since it was a small group systemadministration would be minimal.All students in the pilot course used the CNLS system, but usage varied
- Conference Session
- Internet and Distributed Computing
- Collection
- 2006 Annual Conference & Exposition
- Authors
-
Fani Zlatarova, Elizabethtown College
- Tagged Divisions
-
Information Systems
others. (2005). Query by Excel. Proc. of the 31st Intern. Conf. VLDB’05, VLDB Endowment16. Zlatarova, F. (2004). Computing Projects in Liberal Arts College Environment. 33rd International Symposium IGIP/IEEE/ASEE, Fribourg, Switzerland, pp. 113-11817. Zlatarova, F. (2004). Introducing Ethics in Computing Courses and Extra Class Activities. Proc. of the Frontiers in Education Conference, ASEE/IEEE/IEEE Computer Society, Savannah, GA, pp. S1E.6–S1E.9 Page 11.890.10