Asee peer logo
Displaying all 18 results
Conference Session
IT-based Instructional Technologies
Collection
2007 Annual Conference & Exposition
Authors
Edward Gehringer, North Carolina State University
Tagged Divisions
Information Systems
concludes with a list ofresources that include many more active and cooperative learning exercises.1. IntroductionIn bygone days, the “sage on the stage” was seen as the consummate teacher. Authoritative andentertaining, his words were eagerly listened to by students, and dutifully copied into spiralnotebooks. But today, the competition is tougher. Students grow up with interactive games,watch video on their cellphones, and surf the Web from their laptops during class. To be sure,spellbinding lecturers still exist, but most of us would not count ourselves among them. We canstill use class time to deliver an abridged oral rendition of the textbook, but the majority ofstudents will see it as a waste of time. We can do better.Active and collaborative
Conference Session
IT-based Instructional Technologies
Collection
2007 Annual Conference & Exposition
Authors
Hugh Jack, Grand Valley State University
Tagged Divisions
Information Systems
AJAX - no additional software is needed on the host computer, beyond the browser16. Another sim- ilar software package is Doxwiki. Page 12.1177.4A Sample VisionTechnologically we are ready for electronic books in the classroom. The major barrier at this pointis a proven model that others can reuse. A crude example model of use of the book in a course isoutlined below. 1. Before the course the instructor identifies the text sections and depth that she/he wants to use for the standard student. An instructor could even elect to provide a set of prob- lems to solve for the semester, and then references to
Conference Session
Laboratory and Internship Innovations in IT/IS
Collection
2007 Annual Conference & Exposition
Authors
Ed Crowley, University of Houston
Tagged Divisions
Information Systems
12.490.2Rather than researching new cryptographic algorithms, our students focus on evaluatingcryptographic implementations in the context of particular enterprise security goal(s). Inthese evaluations, our students draw on existing standards and standard organizationssuch as the Security Requirements for Cryptographic Modules (FIPS-140) [2] and theNational Institute for Standards and Technology (NIST). A look at sample learning goalsfor our laboratory module’s will help illustrate this.Sample Module GoalsAt the end of this class, students will be able to:1. Apply cryptographic services to: a. Conceal information within a file (encryption). b. Verify a file’s integrity c. Authenticate a file’s origin2. Provide evidence of non
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2007 Annual Conference & Exposition
Authors
Sohail Anwar, Pennsylvania State University-Altoona College; Jungwoo Ryoo, Pennsylvania State University-Altoona College; Harpal Dhillon, Excelsior College; David Barnes, Pennsylvania State University-Altoona College
Tagged Divisions
Information Systems
areas, except Computer Science and Information Systems. InUnited States, many educational institutions developed information security assurance (ISA)educational models based on standards and guidelines promoted by the government or otherorganizations resulting in a large variety of information systems security education curricula [1].In 2005, the ACM Special Interest Group for Information Technology Education (SIGITE)Curriculum Committee developed a list of the topical areas for the information assurance andsecurity (IAS) domain of the information technology body of knowledge [2]. The topical areas Page 12.226.2include: • Fundamental Aspects
Conference Session
Emerging Information Technologies
Collection
2007 Annual Conference & Exposition
Authors
Robert E. Broadbent, Brigham Young University; Michael Bailey, Brigham Young University; Joseph Ekstrom, Brigham Young University; Scott Hart, Brigham Young University
Tagged Divisions
Information Systems
Conference Session
IT-based Instructional Technologies
Collection
2007 Annual Conference & Exposition
Authors
Judith Challinger, California State University, Chico; Rachael Teasdale, California State University, Chico
Tagged Divisions
Information Systems
collection in the field andsubsequent graphing and analysis are important skills for students in many different scientificdisciplines. This paper presents a project currently underway by computer science andenvironmental science faculty at the California State University, Chico to address these needs. Amulti-tier system is being developed to serve as a repository for data collected in the field byenvironmental science students, facilitate graphing and analysis of data, and provide a platformfor interdisciplinary teams of students to collaborate on both software development and dataanalysis tasks.IntroductionIn 2005, Microsoft Research Cambridge brought together an international panel of scientists forthe Towards 2020 Science workshop.1 Their goal
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2007 Annual Conference & Exposition
Authors
Azzedine Lansari, Zayed University; Akram Al-Rawi, Zayed University; Faouzi Bouslama, Université Laval
Tagged Divisions
Information Systems
weak in covering particular outcomes. This exercise allows the ISCollege to study the effectiveness of individual courses and the program overall in achieving thecollege and University learning outcomes. It is anticipated that using a measurement tool such asthe course outcome matrix may enable academic institutions monitor and improve informationsystems programs.1. IntroductionUniversities in the USA and worldwide are taking a critical look at their educational systems. Arecent US national panel report calls for a dramatic reorganization of undergraduate education toensure that all college students receive not just access to college, but an education of lastingvalue1. The report also recommends colleges to help students become “intentional
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2007 Annual Conference & Exposition
Authors
Barry Lunt, Brigham Young University; Michael Bailey, Brigham Young University; Joseph Ekstrom, Brigham Young University; C. Richard Helps; David Wood
Tagged Divisions
Information Systems
and subjects of research in informationtechnology, as well as the journals and trade periodicals deemed the most relevant for thediscipline. Although there were relatively few subjects in his survey, it serves as a starting pointfor studying journals in information technology. Accordingly, this study began with the scholarlyoutlets found to have the highest number of responses in the Bailey study. Additionally, therewere other relevant publications and conferences identified by the authors that were not includedin the Bailey study. It is interesting to note that some of these publications were also in thecomputing journals study by Rainer, et al., and in the information systems journals study byLowry, et al. This is shown in Table 1
Conference Session
Emerging Information Technologies
Collection
2007 Annual Conference & Exposition
Authors
Warith Al-Sulaimani, Modern College of Business and Science-Sultanate of Oman; P Mani Joseph, Modern College of Business and Science-Sultanate of Oman; Saeid Moslehpour, University of Hartford
Tagged Divisions
Information Systems
between Wireless LANstation and Access Point was fixed to 8 meters and the distance between Master and Slavewas fixed to 2 meters. Table 1 shows the most important attributes used for the WLANstation, WLAN Access Point, Bluetooth Master Node and Bluetooth Slave Node.Table 1: Important attributes of WLAN Station, WLAN Access Point, Bluetooth MasterNode and Bluetooth Slave Node. Device Attribute Value Data Rate 11 Mb/sec Power 10 mWWLAN Station Physical Characteristics DSSS Access Point Functionality Disabled Data Rate
Conference Session
Laboratory and Internship Innovations in IT/IS
Collection
2007 Annual Conference & Exposition
Authors
Shelton Houston, University of Southern Mississippi; Billy Walters, University of Southern Mississippi; Tulio Sulbaran, University of Southern Mississippi
Tagged Divisions
Information Systems
extended periodof time. As shown in Figure 1, approximately one-third of the Mississippi network was downafter Katrina’s landfall which was significantly higher than any other state impacted by Katrina.The loss of electric power to a major petroleum distribution pipeline, over 100 miles inland,resulted in a national gasoline shortage for the eastern United States. The gasoline shortageremained for several weeks after the storm until supplies were restored to normal levels. Thecombination of Hurricanes Katrina and Rita, a few weeks later, damaged over 70% of offshorepetroleum services which created a major price increase to fuel oils and natural gas supplies. Itwould be over 15 months before prices returned to pre-Katrina levels
Conference Session
Emerging Information Technologies
Collection
2007 Annual Conference & Exposition
Authors
Janell Armstrong, Brigham Young University; C. Richard Helps, Brigham Young University
Tagged Divisions
Information Systems
cleardistinction between the different technologies. The learning objectives of such a course modulewould include the following:1) Understanding the key concepts of each technology2) Understanding the application domains of each technology3) Being able to differentiate between the application domains for each technologyThese objectives need to be incorporated into a complete computer technology educationalsystem. Students learning these technologies need a background in basic computer architectures,basic networking, and some skills in configuring networks. At this stage of market acceptance ofthese technologies they could be used as an optional module in an existing networking orembedded systems course or could be expanded into a complete elective course
Conference Session
Laboratory and Internship Innovations in IT/IS
Collection
2007 Annual Conference & Exposition
Authors
Robert Walters, Pennsylvania State University; John Bertoty, Blueroof Technologies, Inc.
Tagged Divisions
Information Systems
Page 12.1375.3 Shown in Figure 1 - a floor plan for the Smart Cottage: Figure 1. Smart Cottage Floor PlanTechnology and InfrastructureThe Smart Cottage has a small computer/logic center with the modems, firewalls, routers and switchesthat are required to connect the home to the Internet. Data/network security is an integral part of thehouse. The cottage has “technology” channels embedded in each wall during construction. After thehouse is constructed, CAT 5E cable, RG-6 coaxial cable and telephone cable (Tri-modal) is droppedthrough the technology channels from the computer center to all rooms, all appliances and sensors.Cables of any type can easily be inserted into the channels for future applications
Conference Session
Laboratory and Internship Innovations in IT/IS
Collection
2007 Annual Conference & Exposition
Authors
Xiaoxi Martin, Western Carolina University; Brant Price, Western Carolina University; James Zhang, Western Carolina University; Duane Dunlap, Western Carolina University; Robert Adams, Western Carolina University
Tagged Divisions
Information Systems
. Page 12.30.1© American Society for Engineering Education, 2007 A Database and User Interface Design for a Remote Accessible Engineering Laboratory Xiaoxi Martin, Brant Price, James Zhang, Duane Dunlap, Robert Adams Kimmel School of Construction Management, Engineering and Technology Western Carolina University, Cullowhee, NC 28723AbstractIn an effort to further improve learning effectiveness and flexibility for engineering andtechnology students, Kimmel School graduate students are implementing a remotely accessibleengineering laboratory based on previous research results [1], [2]. Designing a remote-accessedengineering laboratory can eliminate the unnecessary need
Conference Session
IT-based Instructional Technologies
Collection
2007 Annual Conference & Exposition
Authors
Julie Mariga, Purdue University
Tagged Divisions
Information Systems
DepartmentThe Computer & Information Technology (CIT) department at Purdue University Page 12.1580.2currently offers two baccalaureate degrees. The first is a B.S. in Information SystemsTechnology (IST) and the second degree offering is a B.S. in Network EngineeringTechnology (NET). Each of these degrees accounts for roughly half of the studentpopulation of the department which is currently at 550 students. Additionally, there areseveral areas of specialization within each degree that allow students to concentrate theirstudies on a specific focus within the information technology field. This breakdown canbe seen below. Figure 1 - CIT
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2007 Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley State College; Reza Sanati-Mehrizy, Utah Valley State College
Tagged Divisions
Information Systems
systems designknowledge, it is crucial that the curriculums for computer science and engineering to be Page 12.597.2reviewed and enhanced.Currently, there are five models for teaching embedded systems topics in universities andcolleges: 1. Offering courses mostly on software (Real-Time Systems) in CS and SE undergraduate programs (e.g., at Florida State University, Vanderbilt University, Seoul National University …). 2. Offering courses in CE and EE undergraduate programs which emphasizes the hardware aspects of embedded systems (e.g., University of Utah, Boston University, Carnegie Mellon University …). 3. Graduate
Conference Session
Emerging Information Technologies
Collection
2007 Annual Conference & Exposition
Authors
John Pickard, East Carolina University; Philip Lunsford, East Carolina University; Chip Popoviciu, Cisco Systems, Inc.
Tagged Divisions
Information Systems
perform configuration and troubleshooting tasks 24hours a day, 7 days a week.Lectures for the course were conducted on campus in the College’s Global Classroom wherestudents could attend in person, view real-time web casts, or watch achieved versions of thelecture.The foundation for the lab portion of the class is the Cisco 2800 series and 2600 series routersthat are part of a standard Cisco Networking Academy CCNP equipment bundle.Students had to meet one of the following prerequisites in order to attend this pilot course;CCNA certification, Network + certification, or completion of Cisco Networking Academy Page 12.988.2CCNA semesters 1 – 4. In
Conference Session
Laboratory and Internship Innovations in IT/IS
Collection
2007 Annual Conference & Exposition
Authors
Michael Bailey, Brigham Young University; Michael Moore, Brigham Young University; Joseph Ekstrom, Brigham Young University
Tagged Divisions
Information Systems
configuration for these hard drivesis a goal to have the drive configured so that it could boot any modern computer with no moreeffort that selecting it as the boot drive from a BIOS menu.To support web development, the system developed needs to support a variety of development,client, and server software. To accomplish this, the drives should run both Windows and Linux.This could be accomplished through dual-boot partitions, but would preferably be done usinghardware-level virtualization so that both operating systems could be operational simultaneously.Such simultaneous operation allows the student to use the host OS as a server system for testing,and the virtual OS as the client system, as shown in the rightmost system in Figure 1
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2007 Annual Conference & Exposition
Authors
Mario Garcia, Texas A&M University-Corpus Christi
Tagged Divisions
Information Systems
discretize any of the attributes. Theexperiment was carried out using the normal data as the training data and a subset of attack dataas the test data initially and subsequently using attack data as both training and test data. Wekacannot handle large datasets since it loads everything into memory before it processes the data.To overcome this shortcoming, 5,900 records were generated randomly from the normal data andtwo sets of 6,600 and 3,400 records were generated randomly from the attack data. The subset ofattack data with 3,400 records was used as test data in both cases. The results of using J4.8decision tree on the data are presented in Table 1.Normal data as training data and attack data as test data: Here the normal data (attack-freesubset