Asee peer logo
Displaying all 19 results
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2008 Annual Conference & Exposition
Authors
Henry Chaya, Manhattan College
Tagged Divisions
Information Systems
course was offered, the Arab university had a single 1 Mbit/sec Internet connection forthe entire campus at a cost of $1200 per month. During the hours students are on campus, all downloadsof audio or video content had to be blocked. This restriction made any sort of synchronous interactionwith students impractical except for text messaging or chat. It was not feasible to upload any files fromthe USA that were larger than a few megabytesSome students did not have personal computers at home, and had to rely on university computer labswhich were open from 8 AM to 4 PM Monday to Friday. Page 13.444.2The official language of instruction at
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2008 Annual Conference & Exposition
Authors
Denise Bauer, Pennsylvania State University, University Park; Gül Okudan, Pennsylvania State University
Tagged Divisions
Information Systems
interactions of localized group work.The more specific goals are to understand how different learning styles feel about the use oftechnology for group work and to determine if there is a difference between genders. These goalswill be addressed through four research questions: (1) What are the current technologiesavailable for collaboration during group work and which of these students use? (2) Does the useof technology take away from the traditional face-to-face group work or does it enhance theexperience? (3) Is there a difference among students with different learning styles on the use oftechnology and group work? Does it affect the learning of those individuals? (4) Is there adifference due to gender on the use of technology and group work? Does it
Conference Session
IT-based Instructional Technologies
Collection
2008 Annual Conference & Exposition
Authors
Edward Gehringer, North Carolina State University
Tagged Divisions
Information Systems
AC 2008-1484: ASSESSING STUDENTS' WIKI CONTRIBUTIONSEdward Gehringer, North Carolina State University Page 13.230.1© American Society for Engineering Education, 2008 Assessing Students’ Wiki Contributions Edward F. Gehringer North Carolina State University efg@ncsu.eduAbstractPerhaps inspired by the growing attention given to Wikipedia, instructors have increasingly beenturning to wikis [1, 2] as an instructional collaborative space. A major advantage of a wiki isthat any user can edit it at any time. In a class setting, students may be restricted in
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2008 Annual Conference & Exposition
Authors
Azzedine Lansari, Zayed University; Akram Al-Rawi, Zayed University; Abdallah Tubaishat, Zayed Univeristy; Faouzi Bouslama, Université Laval
Tagged Divisions
Information Systems
Credits Semester 1 Semester 2 COL 110 Computer Applications 3 COL 105 Career Exploration 2 COL 120 Colloquium 3 COL 111 Explorations in Mathematics 3 COL 130 Arabic Concepts 3 CIT 125 Discovering IT 2 Year 1 COL 140 English Composition I 3 Menu I Comparative Professional Systems 2 COL 150 Global Studies I 3 COL 135 Islamic Civilization I 3 COL 145
Conference Session
Information Technologies Classroom Instruction
Collection
2008 Annual Conference & Exposition
Authors
Akram Al-Rawi, KFU; Azzedine Lansari, Zayed University
Tagged Divisions
Information Systems
IAS7. Forensics (1) IAS8. Information States (1) IAS9. Security Services (1) IAS10. Threat Analysis Model (1) IAS11. Vulnerabilities (1)NET. Networking (20 core hours) NET4. Security (2)Since IT systems are increasingly under attack, the knowledge of Information Assurance andSecurity (IAS) is of paramount importance to the profession of IT. The IT professional mustunderstand, apply, and manage information assurance and security in computing,communication, and organizational systems. It is also important for the IT professional toprovide users in an organization with a framework to be sufficiently aware of security issues forthe users to be an asset to the organization rather than a liability. IAS includes
Conference Session
Information and Network Security
Collection
2008 Annual Conference & Exposition
Authors
Peng Li, East Carolina University; Tijjani Mohammed, East Carolina University; Lee Toderick, East Carolina University; Chengcheng Li, East Carolina University; Philip Lunsford, East Carolina University
Tagged Divisions
Information Systems
different platforms. Most hands-on exercises can be donelocally without Internet connection.Compared to the centralized remote lab, the virtual lab is very portable, inexpensive, can be runon the students’ computers, anywhere, and at any time. We have experimented with virtualmachines in a number of labs with a high degree of success. Feedback from students indicatedsatisfaction.1. IntroductionInformation and computer technology programs are plagued by several major challenges. First,computing technologies are evolving at a rapid pace, making it difficult for schools to maintainup-to-date technologies in physical labs due to budget constraints. Second, lab exercisesdeveloped by faculty have short life span and need to be updated to reflect new
Conference Session
Information and Network Security
Collection
2008 Annual Conference & Exposition
Authors
Barry Cumbie, Auburn University; Chetan Sankar, Auburn University; P.K. Raju, Auburn University
Tagged Divisions
Information Systems
utmostimportance to coastal communities that survive and thrive economically, not only from realestate rental services but also as the result of quick restoration of rental properties that havesustained damage after a coastal storm. The participants completed a demographic questionnairethat identified the organization they represented and their role in the organization. Thisquestionnaire also disclosed to the participants the intended use of the data collected. Asummary of the data obtained from the questionnaire is shown in Table 1.Table 1: Focus group participant organizations’ demographic statistics Government (n = 6) Commercial (n = 4) Total (N =10) Demographic Mean Range Mean
Conference Session
Emerging Information Technologies
Collection
2008 Annual Conference & Exposition
Authors
Curtis Welborn, Utah Valley State College; Reza Sanati-Mehrizy, Utah Valley State College
Tagged Divisions
Information Systems
. Temporal logic[1],[2] defines a basic set of primitiverelationships that can exist between intervals in time. These same primitive relationshipscan be used to express temporal relationships between business objects. The EnhancedEntity Relationship (EER) notation allows business rules to be shown in a graphic formusing action assertions which keep the business rule at a conceptual level withoutspecifying how the rule will be implemented. In this paper we will show how the EERnotation can be augmented to allow a software engineer to specify temporal-basedbusiness relationships in a relational data model.IntroductionThere are three common types of business rules[6]: structural assertions, action assertionsand derivations. A structural assertion is
Conference Session
IT-based Instructional Technologies
Collection
2008 Annual Conference & Exposition
Authors
Abul Azad, Northern Illinois University; Ghayasuddin Mohammed, Northern Illinois University; Mohammed Murtuza, Northern Illinois University; Muhammed Abedur Rahman, Northern Illinois University
Tagged Divisions
Information Systems
- Page 13.1394.5anytime arrangement and without any need of Matlab software package. At the same time, allthe updates could be introduced to a single server without any time delay and administrativeoverhead. Recently, Matlab has introduced the Matlab Web Server package that allows one toaccess the Matlab programs and run them from a remote location over the web without havingMatlab software running on clients’ system. With this provision, the lead author introduced theflexible manipulator software facility (simulation, modeling, and control) over the web. Figure 1: Shows major components and their integration within the facility.5. Integration of the Facility The facility is hosted within a server that incorporates a
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2008 Annual Conference & Exposition
Authors
Shuju Wu, Southeast Missouri State University; Ragu Athinarayanan, Southeast Missouri State University; Xiaobing Hou, Southeast Missouri State University; Sophia Scott, Southeast Missouri State University
Tagged Divisions
Information Systems
laboratories.The current TCN curriculum covers digital circuit design, telecommunications and fiber optics,computer networking, network routing and switching, network design and maintenance, systemanalysis and design, wireless communications and networks, server techniques, and networksecurity. Considering that standard engineering courses focus on the technical aspects, but under-address the challenges in system design and configuration, maintenance and troubleshooting, andpure technical schools do not equip students with enough theoretical background, we created acurriculum to balance both theoretical and technical requirements. Ma & Nickerson [1] found that hands-on laboratories adhered to goals of the Accreditation Boardfor Engineering and
Conference Session
Information Technologies Classroom Instruction
Collection
2008 Annual Conference & Exposition
Authors
Steven Hansen, University of St. Thomas
Tagged Divisions
Information Systems
leisure time was the sport ofbird watching. The complexity of the number of plumages of birds due to age, sex, andbreeding plumages made identification a very difficult task for some species.In the 1930s, a method of identification was developed by Roger Tory Peterson4 thatbroke down bird identification to a listing of identifiable patterns, and he created theconcept of field guides containing paintings of each species with a listing of fieldidentification marks to look for when identifying the species. This method has beenwidely copied, and is now used for many organisms and other natural entities in additionto birds. An example of the use of this system for program code is provided in Figure 1.Figure 1. Example use of Peterson Identification
Conference Session
IT-based Instructional Technologies
Collection
2008 Annual Conference & Exposition
Authors
Arunachala Nadar Mada Kannan, Arizona State University; Barbara Rempel, Arizona State University, Polytechnic campus; Lakshmi Munukutla, Arizona State University; Bert Valenzuela, Arizona State University
Tagged Divisions
Information Systems
age-old format of separating lecture and lab in Engineering and Technology curriculahas many drawbacks given scheduling and classroom constraints. With the shift toward amore non-traditional student population, students are seeking courses taught in astreamlined fashion, preferring to complete weekly meetings in one day, if possible. Thecompressed format makes it even more imperative to diversify the experience in theclassroom in order to heighten motivation, and facilitate learning. The eStudio (SeeFigure 1), is a very new project within the department. The goals for the program aremultifaceted and include promoting collaboration among the students, facilitatingcontinuous improvement of the curriculum, and providing for distance learning
Conference Session
Information Technologies Classroom Instruction
Collection
2008 Annual Conference & Exposition
Authors
Robert MacDonald, Purdue University; Raheel Malik, Whirlpool Corp.; Anthony Smith, Purdue University; James Goldman, Purdue University
Tagged Divisions
Information Systems
protocol, wireless distribution system, and the classic wirednetwork.1. IntroductionThe introduction of wireless networking has allowed people the freedom to access networks,including the Internet, from almost any location. This fact has been reflected, in part, by a surgein laptop sales over the recent years. Vice president of Gartner’s worldwide computingplatforms, Charles Smulders, states that “Consumers are flocking to notebooks because of lowerprices, better performance, and an increased appreciation for wireless technologies.”5 Theincreased appreciation here stems from the transparently bridging technologies. According to anengineer at Qualcomm, “One of the fundamental design goals for 802.11 is to provide servicesthat are consistent
Conference Session
Information and Network Security
Collection
2008 Annual Conference & Exposition
Authors
Okechi Egekwu, James Madison University
Tagged Divisions
Information Systems
to ease adoption pains. The paper will also discuss efforts at James MadisonUniversity to expose students to the various aspects of this technology.RFID NetworksAt the enterprise level, an RFID system will comprise many different technologies, includingbarcodes systems, passive and active tags, GPS/GIS systems, and chain of smart software – thehardware and software from different vendors must be seamlessly integrated. See Figure 1 forrepresentative auto ID technologies that one will find in a robust enterprise system. Transport Movement Item Packaging Unit Load Container unit
Conference Session
Information Technologies Classroom Instruction
Collection
2008 Annual Conference & Exposition
Authors
Mohammad Dadfar, Bowling Green State University
Tagged Divisions
Information Systems
different levels of processes such asparent, children, and sibling processes. We also describe a practical client-server applicationstudents are already familiar with.1. IntroductionData communications and networking courses have been among the most popular courses incomputer science departments during the past two decades. Most students try to complete atleast one course in this area. Instructors assign different types of projects for their datacommunications and networking courses1, 2. In our department we have offered a sophomorelevel mandatory course (Operating Systems and Networks) that introduces both operatingsystems and data communications concepts. Following this course, we have elective courses ineach of operating systems and data
Conference Session
Emerging Information Technologies
Collection
2008 Annual Conference & Exposition
Authors
Kyle Lutes, Purdue University; Richard Mislan, Purdue University, West Lafayette
Tagged Divisions
Information Systems
displayed on a connected laptop computer, saved for later analysis, or printed.Third, we list the technologies used for its development. Finally, we conclude with ademonstration of the software and our future plans for its continued development.The Ubiquity of Mobile Computing DevicesFollowing in the steps of PDAs, smartphones are becoming personal oracles of information 1, 2.While early generation cellular telephones were used only for voice communications, moderndigital mobile phones have quickly become societal necessities for daily existence. Not only dosmartphones support voice communications, these devices provide technologies for ShortMessage Service (SMS) messaging, Multi-Media Messaging Service (MMS) messaging, InstantMessaging (IM
Conference Session
IT-based Instructional Technologies
Collection
2008 Annual Conference & Exposition
Authors
Clifton Kussmaul, Muhlenberg College
Tagged Divisions
Information Systems
summarize best practices, lessons learned, anddirections for future experimentation and development. Using OSS tools helps students learn touse new tools, exposes them to tools or types of tools they are likely to encounter in the future,and enables them to attempt and complete more ambitious projects under more realisticconditions. Like any tools, OSS requires an ongoing time investment by faculty, but helps themto diagnose and correct problems, assess student performance, and help the projects and teamsadapt to other factors.1. IntroductionOpen source software (OSS) is distributed without charge and with the underlying source code,so that other software developers can fix defects, update documentation, add enhancements, orotherwise modify the
Conference Session
Information and Network Security
Collection
2008 Annual Conference & Exposition
Authors
Richard Smith, U. of St. Thomas - St. Paul
Tagged Divisions
Information Systems
systems, and networking. This is because many textbooks present information securityin terms of those other topics. We are experimenting with a different approach: a lower divisionundergraduate course that introduces students to the concepts of boundaries and informationflows. Professional security engineers often analyze problems in terms of these basic concepts.The course introduces security concepts by starting with security issues of small scaleperimeters, and incrementally expands the scope by looking in turn at shared single computers,local area networks, and the Internet.1. IntroductionWhen the Computer and Information Sciences Department at the University of St. Thomas beganto develop an information security program, two objectives
Conference Session
Emerging Information Technologies
Collection
2008 Annual Conference & Exposition
Authors
David Dampier, Mississippi State University
Tagged Divisions
Information Systems
Training Center as a Regional Outreach and Service Activity”, Proceedings of the 2007 Hawaii International Conference on the System Sciences, Minitrack on Digital Forensics, Waikoloa, Hawaii, January 3-7, 2007. Page 13.264.910. Whitcomb, C., “An Historical Perspective of Digital Evidence: A Forensic Scientist’s View”, International Journal of Digital Evidence, Vol. 1, Num. 1, Spring 2002. Page 13.264.10