- Conference Session
- Computing and Information Technology Division (CIT) Technical Session 1
- Collection
- 2024 ASEE Annual Conference & Exposition
- Authors
-
Mudasser Fraz Wyne, National University; Alireza Farahani; Lu Zhang, National University
- Tagged Divisions
-
Computing and Information Technology Division (CIT)
Paper ID #41786Examining ChatGPT in Educational Settings: Ethics, Challenges, and OpportunitiesDr. Mudasser Fraz Wyne, National University I hold a Ph.D. in Computer Science, an M.Sc. in Engineering, and a B.Sc. in Electrical Engineering. Currently, I am honored to serve as a Professor of Computer Science and as the Chair for the Department of Computer Science and Information Systems at the School of Technology and Engineering, National University, San Diego, USA. Additionally, I am entrusted with the role of Academic Program Director for the MS in Computer Science. Over the years, I have played key leadership roles
- Conference Session
- Computing and Information Technology Division (CIT) Technical Session 3
- Collection
- 2024 ASEE Annual Conference & Exposition
- Authors
-
Sharifa Alghowinem, Massachusetts Institute of Technology; Aikaterini Bagiati, Massachusetts Institute of Technology; Andrés F. Salazar-Gómez, Massachusetts Institute of Technology; Cynthia Breazeal, Massachusetts Institute of Technology
- Tagged Divisions
-
Computing and Information Technology Division (CIT)
adoption in theirworkplace, address its ethical implications, and enable better communication about AI initiativeswithin the organization. It also demystifies the technology, and ensures leaders can responsiblynavigate AI-driven changes.Most AI-related courses mainly focus on teaching programming languages and handling big data.A closer look at AI adult education reveals gaps and limitations in content suitable forprofessional adults – e.g in leadership, decision-making, ethics, governance and cultural aspectsof organizational change. Furthermore, AI education pedagogy for adult learners,is stillunderstudied. Literature suggests that adults are self-directed, experience-based learners.Therefore, their learning should involve self-planning
- Conference Session
- Computing and Information Technology Division (CIT) Technical Session 1
- Collection
- 2024 ASEE Annual Conference & Exposition
- Authors
-
Tarik Eltaeib, Farmingdale State College ; M. Nazrul Islam, State University of New York; Qinghai Gao
- Tagged Divisions
-
Computing and Information Technology Division (CIT)
important feature of a COVML which is crucial toaccommodate the increasing number of students and evolving educational needs[7].It is essential to teach students about ethical cybersecurity practices. This will provide them with thenecessary skills to responsibly test and secure computer systems. By emphasizing the importance ofethical behavior in cybersecurity, we can help to create a culture of trust, integrity, and responsibility inthe field. This will benefit individual students and contribute to a more secure and stable digitallandscape for all users[7, 26].2. COVML Safe Environment for Learning and Testing:Cybersecurity refers to the practice of protecting computer systems, networks, and data fromunauthorized access, damage, or theft. VM
- Conference Session
- Computing and Information Technology Division (CIT) Technical Session 3
- Collection
- 2024 ASEE Annual Conference & Exposition
- Authors
-
M Nazrul Islam, State University of New York, Farmingdale
- Tagged Divisions
-
Computing and Information Technology Division (CIT)
, 5. Network security, 6. Operating systems security, 7. Cloud security, 8. Software security, 9. Vulnerability analysis, 10. Penetration testing/ethical hacking, 11. Risk management, 12. Digital forensics, 13. Cybersecurity law and policy.BiometricsBiometrics information is playing a significant role in the field of cybersecurity. Three majorareas of biometric information processing in cybersecurity are listed below. 1. Access control: Biometric information is used to verify and authenticate any individual requesting access to confidential information and/or a secure facility. 2. Forensics: Biometric information can be analyzed to identify the person responsible for a malicious activity. 3. Biometric
- Conference Session
- Computing and Information Technology Division (CIT) Technical Session 4
- Collection
- 2024 ASEE Annual Conference & Exposition
- Authors
-
Alejandra Noemi Vasquez, Tufts University; Trevion S Henderson, Tufts University; David Zabner, Tufts University
- Tagged Divisions
-
Computing and Information Technology Division (CIT)
, focusingparticularly on manifestations of algorithmic thinking. Our work was guided by the followingresearch question:1. How are students’ algorithmic thinking skills manifested in their approaches to solving problems using programming? MethodsResearch SettingIn this research, we focus on one section of an introductory computer science course for first-year engineering students at a private, highly selective research university in the northeasternUnited States. Because the course is for engineering students, there is a heavy emphasis onmodeling, data analysis, and statistics. The course is also a testbed for the inclusion of ethics andsociotechnical thinking within engineering classrooms. The section in this study
- Conference Session
- Computing and Information Technology Division (CIT) Technical Session 6
- Collection
- 2024 ASEE Annual Conference & Exposition
- Authors
-
Sreekanth Gopi, Kennesaw State University; Nasrin Dehbozorgi, Kennesaw State University
- Tagged Topics
-
Diversity
- Tagged Divisions
-
Computing and Information Technology Division (CIT)
- Conference Session
- Computing and Information Technology Division (CIT) Technical Session 6
- Collection
- 2024 ASEE Annual Conference & Exposition
- Authors
-
Aadithyan Vijaya Raghavan, Cleveland State University; Chansu Yu, Cleveland State University
- Tagged Divisions
-
Computing and Information Technology Division (CIT)
three attack vectors (4.4% of all theknowledge in the NICE Framework) TKSA Num- TKSA Description Phishing/Social Malware Web- ber Engineering Based Attacks K0003 Knowledge of laws, regulations, poli- * * * cies, and ethics as they relate to cyber- security and privacy. K0006 Knowledge of specific operational im- * * * pacts of cybersecurity lapses. K0066 Knowledge of Privacy