Asee peer logo
Displaying all 11 results
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2007 Annual Conference & Exposition
Authors
Azzedine Lansari, Zayed University; Akram Al-Rawi, Zayed University; Faouzi Bouslama, Université Laval
Tagged Divisions
Information Systems
Page 12.275.8track of their learning experiences, faculty members use the electronic portfolio as a tool tomeasure the level of student understanding. The electronic portfolio can also provide importantinformation on the effective implementation of key concepts in the overall IS curriculum. Figure1 shows the components that are used to monitor the IS program effectiveness. Z U L e a r n in g O u tc o m e s C IS M a jo r C ritic a l T h in k in g a n d R e a s o n in g (C T R ) P ro b le m Id e n tific a tio n a n d A n a ly s is G lo b a l A w a re n e s s (G A ) ( P IA ) In fo rm a tio n L ite ra c y a n
Conference Session
IT-based Instructional Technologies
Collection
2007 Annual Conference & Exposition
Authors
Edward Gehringer, North Carolina State University
Tagged Divisions
Information Systems
such game is Dyads. Participants write outa question on the material covered during the class, then pair up with another member of theclass. Each one of the pair asks the other his/her question. If the answer is correct, thequestioner writes his/her initials on the other person’s card. If it is incorrect, (s)he explains thecorrect answer. After finishing the first question, the members each find another partner andattempt to answer the new partner’s question. The winner is the member with the highest score.ii. Row competitions. Among the simplest of games is just to pass out index cards to the classmembers, and have them answer a set of review questions. Each student’s answers are checkedby a neighboring student. Then the cards are passed to
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2007 Annual Conference & Exposition
Authors
Mario Garcia, Texas A&M University-Corpus Christi
Tagged Divisions
Information Systems
thisis to deploy a passive tap with minimal effect on network operations. The sensor is deployed onthis tap between the external firewall and the internal network such that it can monitor all thetraffic that enters (and departs) over that connection. This allows the sensor to examine all of thedata associated with the external link so that it can be effectively used to monitor incoming (andoutgoing) attacks. The snort machine is located at the main router on campus, which is connectedto the Internet by a 100Mb/s full-duplex Ethernet link. Data was collected on the network tapover a period of one week by running Snort in a stealthy packet logging mode.The goal of the analysis is to create descriptive information from the raw TCPDUMP files, thento
Conference Session
Emerging Information Technologies
Collection
2007 Annual Conference & Exposition
Authors
Warith Al-Sulaimani, Modern College of Business and Science-Sultanate of Oman; P Mani Joseph, Modern College of Business and Science-Sultanate of Oman; Saeid Moslehpour, University of Hartford
Tagged Divisions
Information Systems
WLAN and Bluetooth etc. Other futuredirections include exploring the physical characteristics for WLAN and Bluetooth and theirrespective performance in an interference-limited environment.References[1] Ennis, Greg, “Impact of Bluetooth on 802.11 Direct Sequence,” IEEE 802.11. Working Group Contribution, IEEE 802.11-98/319, September 1998.[2] Haartsen J.C. and Zurbes S., “Bluetooth voice and data performance in 802.11 DS WLAN environment,” SIG Publication, 1999.[3] Punnoose R. J., Tseng R. S., Stancil D. D. Experimental Results for Interference between Bluetooth and IEEE 802.11b DSSS Systems. In Proceedings of IEEE Vehicular Society Conference, October 2001.[4] Golmie, N. and Mouveaux F., Interference in the 2.4 GHz
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2007 Annual Conference & Exposition
Authors
Barry Lunt, Brigham Young University; Michael Bailey, Brigham Young University; Joseph Ekstrom, Brigham Young University; C. Richard Helps; David Wood
Tagged Divisions
Information Systems
overall average of their ranking. Columns threethrough five are responses to the same statements given for Table 3 above. The abbreviationsused were defined previously in Table 2. It is interesting to note that this same table may be usedas the ranking by how widely familiar each conference is, as the sort by Overall Average isexactly the same as a sort by Not Familiar. As with the publications, respondents were given the opportunity to enter otherconference(s) they wished to include, along with their ranking. There were nine other Page 12.1216.10conferences mentioned; only the Consortium for Computing Sciences in College (CCSC) wasmentioned
Conference Session
Laboratory and Internship Innovations in IT/IS
Collection
2007 Annual Conference & Exposition
Authors
Shelton Houston, University of Southern Mississippi; Billy Walters, University of Southern Mississippi; Tulio Sulbaran, University of Southern Mississippi
Tagged Divisions
Information Systems
. Figure 1. Percentage of Network Outage after Katrina’s Landfall1Response to the Affected AreaFrom across the U. S. volunteers traveled to affected areas such as Waveland and Bay St. Louis,Mississippi and recognized the numerous critical needs such as communication services. Asvolunteers arrived in the Waveland and Bay St. Louis area, they began setting up camps in anyopen area such as ballparks, campgrounds or parking lots. Volunteers assisted with debris cleanup, repairs, social services and soup kitchens. These volunteers needed to contact their familiesand host organizations. Residents needed to contact FEMA for assistance with their losses.FEMA requested that residents contact the agency through their website by completing an online
Conference Session
Laboratory and Internship Innovations in IT/IS
Collection
2007 Annual Conference & Exposition
Authors
Michael Bailey, Brigham Young University; Michael Moore, Brigham Young University; Joseph Ekstrom, Brigham Young University
Tagged Divisions
Information Systems
web testing and development, as was shown in Figure 1, or anexternal client can be used to probe both the Windows and Linux web servers, as was also shownin the figure.In addition to functionality, the speed of the portable hard drive was also tested. USB 2.0 isn't asfast as an internal hard drive connection such as ATA, and this interface is the most obviousbottleneck in an externally booted system. USB 2.0 is rated at 60 MB/s, while the Serial ATAdrives common in new desktop computers can reach at least 150 MB/s, depending on whichversion of SATA is being used. While it seems that this speed difference should severely affectsystem performance, the only time that testers noted a difference was during boot time, probablydue to caching. To
Conference Session
Emerging Information Technologies
Collection
2007 Annual Conference & Exposition
Authors
Robert E. Broadbent, Brigham Young University; Michael Bailey, Brigham Young University; Joseph Ekstrom, Brigham Young University; Scott Hart, Brigham Young University
Tagged Divisions
Information Systems
provides students with functionality beyondthat which is available through the JDBC API. Persistence frameworks can make datapersistence less error prone than JDBC alone, but it is time consuming and can add additionalcomplexity and frustration. However, in many situations a persistence framework may be worththe additional effort.Bibliography1. Riccardi, G. Principles of Database Systems with Internet and Java Applications, Addison Wesley, 2001.2. Fussel, M. Foundations of O-R Mapping: Conlcusion, 2000, available Jan. 16, 2007 at: http://www.chimu.com/publications/objectRelational/part0008.html3. Armstrong, E., J. Ball, S. Bodoff, Et al., Dec. 5, 2005, available Jan. 16, 2007 at: http://java.sun.com/j2ee/1.4/docs/tutorial/doc
Conference Session
Laboratory and Internship Innovations in IT/IS
Collection
2007 Annual Conference & Exposition
Authors
Ed Crowley, University of Houston
Tagged Divisions
Information Systems
12.490.2Rather than researching new cryptographic algorithms, our students focus on evaluatingcryptographic implementations in the context of particular enterprise security goal(s). Inthese evaluations, our students draw on existing standards and standard organizationssuch as the Security Requirements for Cryptographic Modules (FIPS-140) [2] and theNational Institute for Standards and Technology (NIST). A look at sample learning goalsfor our laboratory module’s will help illustrate this.Sample Module GoalsAt the end of this class, students will be able to:1. Apply cryptographic services to: a. Conceal information within a file (encryption). b. Verify a file’s integrity c. Authenticate a file’s origin2. Provide evidence of non
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2007 Annual Conference & Exposition
Authors
Sohail Anwar, Pennsylvania State University-Altoona College; Jungwoo Ryoo, Pennsylvania State University-Altoona College; Harpal Dhillon, Excelsior College; David Barnes, Pennsylvania State University-Altoona College
Tagged Divisions
Information Systems
. Reynolds, C. “ An Undergraduate Information Assurance Curriculum.” Proceedings of the 2003 IEEEWorkshop on Information Assurance, 2003.5. McTighe, J., G. Wiggins. Understanding by Design. Association for Supervision and Curriculum Development,Alexandria, Virginia, 1998.6. Anwar, S. and P. Ford. “Use of a Case Study Approach to Teach Engineering Technology Students.”International Journal of Electrical Engineering Education, 38 (1), January 2001, pp 1-10. Page 12.226.10
Conference Session
Laboratory and Internship Innovations in IT/IS
Collection
2007 Annual Conference & Exposition
Authors
Xiaoxi Martin, Western Carolina University; Brant Price, Western Carolina University; James Zhang, Western Carolina University; Duane Dunlap, Western Carolina University; Robert Adams, Western Carolina University
Tagged Divisions
Information Systems
Specialized in 2010,” IT Pro Published by the IEEE Computer Society,November/December 2004.[5] Zhang, L., Shao, S., Zeng, X., Cai, X., “Development of Remote Learn System on Mobile Internet,”Proceedings of the 4th World Congress on Intelligent Control and Automation, June 10-14, 2002. Shanghai, China.[6] Ramirez, J., Segura, J.C., Gorriz, J.M., Benitez, C., Rubio, A., “GAIALAB: A Weblab Project for DigitalCommunications Distributed Learning,” ICASSP, 2006.[7] Sypin, E., Syvopliasov, A. A., “Statement of the Problem on Laboratory Work through Internet,” 4th SiberianRussian Workshop and Tutorials EDM’2003, Section III, 1-4 July, Erlagol.[8] Zhao, X., Zhong, Y., Matsumoto, M., “A Real-Time Interactive Shared System for Distance Learning,” Multi-Media