- Conference Session
- Curricular Issues in Computer-Oriented Programs
- Collection
- 2007 Annual Conference & Exposition
- Authors
-
Azzedine Lansari, Zayed University; Akram Al-Rawi, Zayed University; Faouzi Bouslama, Université Laval
- Tagged Divisions
-
Information Systems
arecollected. The data is then compiled and analyzed for each course. Results of the analysis arecompared to the course outcome matrix and used to update the achievement levels, refine the setof learning outcomes, or adjust the course learning experiences. This process allows facultymembers to examine how successful they were in integrating learning outcomes in their courses.Furthermore, an in-depth analysis may be performed on a regular basis to assess theeffectiveness of the IS curriculum in integrating various learning outcomes. Based on thisanalysis, specific learning outcomes may be modified or replaced as needed. This is a dynamicprocess that allows the IS curriculum to stay current and effective in focusing student learning as
- Conference Session
- Emerging Information Technologies
- Collection
- 2007 Annual Conference & Exposition
- Authors
-
John Pickard, East Carolina University; Philip Lunsford, East Carolina University; Chip Popoviciu, Cisco Systems, Inc.
- Tagged Divisions
-
Information Systems
. Dr. Ciprian Popoviciu, CCIE, is a Technical Leader at Cisco Systems with over nine years of experience in data and voice over IP communications technologies. As part of Cisco's Network Solution Integration Test Engineering (NSITE) organization, he currently focuses on the architecture, design and validation of large IPv6 network deployments in direct collaboration with Service Providers and Enterprises worldwide. Ciprian is a regular speaker or chair at conferences and industry events and contributes to various technology publications. He is an active contributor to the IETF standards, he is a Senior member of IEEE and member of several academic advisory boards. Ciprian is co-author of the
- Conference Session
- Curricular Issues in Computer-Oriented Programs
- Collection
- 2007 Annual Conference & Exposition
- Authors
-
Sohail Anwar, Pennsylvania State University-Altoona College; Jungwoo Ryoo, Pennsylvania State University-Altoona College; Harpal Dhillon, Excelsior College; David Barnes, Pennsylvania State University-Altoona College
- Tagged Divisions
-
Information Systems
offers a perspective of how Penn State University-Altoona College, anundergraduate institution in Pennsylvania is taking steps to integrate ISA education into its four-year electromechanical engineering technology program. The college realizes that it is highlyimportant for its engineering students to be knowledgeable about information systems securitysince engineers are now expected to have at least a basic understanding of current threats, theconstant change in the nature of those threats, how these threats affect product development,personal safety, employee productivity, and organizational expenses.IntroductionThe specific intent of an information systems security education curriculum should be to trainprofessionals who are able to analyze
- Conference Session
- Curricular Issues in Computer-Oriented Programs
- Collection
- 2007 Annual Conference & Exposition
- Authors
-
Afsaneh Minaie, Utah Valley State College; Reza Sanati-Mehrizy, Utah Valley State College
- Tagged Divisions
-
Information Systems
the requirements of 30 credit hours of core courses common to allcomputer science students. The students continue taking core courses until the first semester oftheir junior year, when they begin taking their electives from different specialization areas.In this paper, the authors are proposing a new area of specialization in their computer sciencedepartment called Embedded Systems Engineering. The paper elaborates the detail content ofthe curriculum requirement for this track.Embedded Systems EngineeringThe area of Embedded Systems Design has been gaining a tremendous growth in recent years. Amajor aspect of this growth has been the addition of networking technologies and operatingsystems to embedded systems. Embedded systems have
- Conference Session
- Laboratory and Internship Innovations in IT/IS
- Collection
- 2007 Annual Conference & Exposition
- Authors
-
Ed Crowley, University of Houston
- Tagged Divisions
-
Information Systems
, Firefox, and Apache.Because the objectives are curriculum dependent, it would be helpful to review thecurriculum within which our cryptography course evolved.Our Applied Cryptography ClassOur College is a small college within a large university. In addition to other goals, ourapplied security program is designed to prepare students to provide enterprise securityassessment and evaluation. Expected job titles for our graduates include securityinvestigator, manager, and auditor.The scope of the applied cryptography class includes cryptographic services required tosecurely store and transmit confidential information. It also includes relatedcryptographic services such as those that provide integrity, authentication, andnonrepudiation. Specific topic
- Conference Session
- Laboratory and Internship Innovations in IT/IS
- Collection
- 2007 Annual Conference & Exposition
- Authors
-
Michael Bailey, Brigham Young University; Michael Moore, Brigham Young University; Joseph Ekstrom, Brigham Young University
- Tagged Divisions
-
Information Systems
ofuse, and in the case of the drives, portability between host computers. Other comparisons suchas weight and cost are readily apparent, but were evaluated according to their importance to thestudents. The study found that portable hard drives are an effective compromise between cost,flexible lab use, and performance.IntroductionEducating future Information Technology (IT) practitioners can be a very costly endeavor for auniversity due to the expense of obtaining, updating and maintaining computer hardware forstudent practicum. Typical IT laboratory curriculum includes networking, web programming,database development, information assurance and security, and system administration, all ofwhich may have unique system and configuration requirements
- Conference Session
- IT-based Instructional Technologies
- Collection
- 2007 Annual Conference & Exposition
- Authors
-
Edward Gehringer, North Carolina State University
- Tagged Divisions
-
Information Systems
scratch the surface, but I am hopeful that it has given the reader a good overview ofthe techniques that are available. Reading individual papers will convey good ideas, a few at atime. To peruse techniques in larger batches, become familiar with the following resources. • For an overview of considerations in applying ACL to computing, and how to go about integrating it into your courses, see Jeffrey McConnell’s series in Inroads.19, 20, 21, 22 • For a large set of games that can be played in class, see http://www.thiagi.com/games.html. • For programming puzzles that can be turned into games, Pollard and Duvall27 recommend the “Head First” series of books.10, 30 • A large set of kinesthetic learning
- Conference Session
- IT-based Instructional Technologies
- Collection
- 2007 Annual Conference & Exposition
- Authors
-
Julie Mariga, Purdue University
- Tagged Divisions
-
Information Systems
Degrees and SpecializationsThe Need for the CourseDue to the growth in networking and virtual technologies and the need for undergraduatestudents in non-networking majors to understand and learn about network protocols,network operating system fundamentals, network operating systems, database and webservers and directory services, a course for IST students was developed. The course alsowas a result of feedback given to CIT by their Industrial Advisory Board (IAB). Prior toABET creating an information technology accreditation for IT programs, CIT relied onthe IAB for feedback on ways to improve the curriculum and facilities. In 2000, one ofthe main action items given to CIT from the IAB was that IST students needed to havehands-on experience with