Asee peer logo
Displaying all 7 results
Conference Session
Emerging Information Technologies
Collection
2009 Annual Conference & Exposition
Authors
Stephen Gilbert, Iowa State University; Pam Shill, Iowa State University; Kevin Saunders, Iowa State University
Tagged Divisions
Information Systems
, interface design, human computer interaction, ethics, and graduate life. For theremaining time, students conduct interdisciplinary research projects in groups of three. Eachgroup is mentored by graduate students in the Human Computer Interaction Graduate Programunder the supervision of HCI faculty. The five research projects are presented at an end-of-thesummer campus-wide research symposium in the form of posters, demos, and a five-pageresearch paper. This REU Site benefits from strong institutional support and mechanisms forrecruitment, mentoring and long-term retention that are particularly effective at targetingunderrepresented groups in science and engineering.This analysis offers the reader key insights into building an REU experience that
Conference Session
Emerging Information Technologies
Collection
2009 Annual Conference & Exposition
Authors
Reza Sanati-Mehrizy, Utah Valley State College; Afsaneh Minaie, Utah Valley University
Tagged Divisions
Information Systems
hours of course work. These 123 credit hours include 36 credithours general study, 45 credit hours of Computer Science core requirements, and 42 credit hoursrequirements for student graduating in Database Area of Specialization listed as follows: General Study (36 Credit Hours) All students graduating from XXX must complete the following 36 credit hours general study. ≠ ENGL 1010 Introduction to Writing 3.0 ≠ ENGL 2020 Intermediate Writing 3.0 ≠ PHIL 2050 Ethics & Value 3.0 ≠ ECON or HIST or PLSC
Conference Session
Emerging Information Technologies
Collection
2009 Annual Conference & Exposition
Authors
C. Richard Helps, Brigham Young University; Bret Swan, Brigham Young University
Tagged Divisions
Information Systems
programsoffering themTopic %Written Communication 87Oral communication 83Engineering Ethics 76Project Planning and Scheduling 72Decision making 68Teambuilding 66Team Dynamics
Conference Session
Emerging Information Technologies
Collection
2009 Annual Conference & Exposition
Authors
Michael Bailey, Brigham Young University; Joseph Ekstrom, Brigham Young University
Tagged Divisions
Information Systems
. Even for IT professionals who are more interested in development than inadministration careers, these concepts are vital to understand, since the develop locally, deployremotely paradigm is prevalent in industry. If not, one could envision a case where a Perl scriptwas put onto a deployment server, and a developer not understanding why its default filepermissions prevent it from executing. Additionally, exercises like this that reinforce commandline experience are desirable.Other BenefitsUpon completion of the course, the students are allowed to retain their VPS until graduation, anddo any ethical and non-commercial thing that they may desire with it. Many do not use thisresource after this sophomore-level course, but others do for other
Conference Session
Information and Network Security
Collection
2009 Annual Conference & Exposition
Authors
Nestor Osorio, Northern Illinois University; Andrew Otieno, Northern Illinois University
Tagged Divisions
Information Systems
and practices, admissions and graduation requirements, advising, research opportunities, retention, and minority groups. Topics relating to faculty include specific teaching methods, publications and research methods, hiring, promotion, tenure, and strategies and tools used in the classroom. Practitioners and alumni address subjects relating to industry and collaborations. Assessment and evaluation refer to improving specific courses as well as overall engineering programs, plus distance learning, design, and ethics courses. Other topics include history of engineering education, and education and learning theory. Taken together they comprise the foundational subjects of engineering
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2009 Annual Conference & Exposition
Authors
Phil Rawles, Purdue University; Anthony Smith, Purdue University; Raymond Hansen, Purdue University; Jeffrey Sprankle, Purdue University
Tagged Divisions
Information Systems
defensive recognition and thwarting of the other teams attacks, while alsoearning points for keeping their managed network at optimum performance for users. Studentsare allowed to use any equipment the department has available, and it is up to the team to designthe network using best practices after evaluating numerous architectures and methodologies.Legal and ethical issues are addressed throughout the course in order to develop networkengineers that understand effective and safe methods of probing both internal and externalnetworks for vulnerabilities lawfully.Figure 2 below shows the significant changes made to the curriculum and its effect on the criticalpath. In this change, a new concept was introduced and is termed a concurrent prerequisite
Conference Session
Emerging Information Technologies
Collection
2009 Annual Conference & Exposition
Authors
Mudasser Wyne, National University, San Diego; Arzu Baloglu, Marmara University, Turkey
Tagged Divisions
Information Systems
actions oftransactions survive even with system crashes or media failures.4.5. Security ManagerWe must recognize the great risks that accompany the increased opportunity ofinformation and telecommunication technology. Once a healthcare provider connects itssystem (PIMS) to a public network, security issues become extremely important.Unauthorized access and data corruption are constant threats. We need to establish propersecurity measures as preventive measures. Security of data is a broad area that addressesmany issues, including the following:Legal and ethical Issues: These issues deal with the right to access certain information.Some information may be deemed private and cannot be accessed legally byunauthorized persons. In case of medical