Asee peer logo
Displaying all 7 results
Conference Session
Computing and Information Technology Division (CIT) Technical Session 1
Collection
2024 ASEE Annual Conference & Exposition
Authors
Mudasser Fraz Wyne, National University; Alireza Farahani; Lu Zhang, National University
Tagged Divisions
Computing and Information Technology Division (CIT)
Paper ID #41786Examining ChatGPT in Educational Settings: Ethics, Challenges, and OpportunitiesDr. Mudasser Fraz Wyne, National University I hold a Ph.D. in Computer Science, an M.Sc. in Engineering, and a B.Sc. in Electrical Engineering. Currently, I am honored to serve as a Professor of Computer Science and as the Chair for the Department of Computer Science and Information Systems at the School of Technology and Engineering, National University, San Diego, USA. Additionally, I am entrusted with the role of Academic Program Director for the MS in Computer Science. Over the years, I have played key leadership roles
Conference Session
Computing and Information Technology Division (CIT) Technical Session 3
Collection
2024 ASEE Annual Conference & Exposition
Authors
Sharifa Alghowinem, Massachusetts Institute of Technology; Aikaterini Bagiati, Massachusetts Institute of Technology; Andrés F. Salazar-Gómez, Massachusetts Institute of Technology; Cynthia Breazeal, Massachusetts Institute of Technology
Tagged Divisions
Computing and Information Technology Division (CIT)
adoption in theirworkplace, address its ethical implications, and enable better communication about AI initiativeswithin the organization. It also demystifies the technology, and ensures leaders can responsiblynavigate AI-driven changes.Most AI-related courses mainly focus on teaching programming languages and handling big data.A closer look at AI adult education reveals gaps and limitations in content suitable forprofessional adults – e.g in leadership, decision-making, ethics, governance and cultural aspectsof organizational change. Furthermore, AI education pedagogy for adult learners,is stillunderstudied. Literature suggests that adults are self-directed, experience-based learners.Therefore, their learning should involve self-planning
Conference Session
Computing and Information Technology Division (CIT) Technical Session 1
Collection
2024 ASEE Annual Conference & Exposition
Authors
Tarik Eltaeib, Farmingdale State College ; M. Nazrul Islam, State University of New York; Qinghai Gao
Tagged Divisions
Computing and Information Technology Division (CIT)
important feature of a COVML which is crucial toaccommodate the increasing number of students and evolving educational needs[7].It is essential to teach students about ethical cybersecurity practices. This will provide them with thenecessary skills to responsibly test and secure computer systems. By emphasizing the importance ofethical behavior in cybersecurity, we can help to create a culture of trust, integrity, and responsibility inthe field. This will benefit individual students and contribute to a more secure and stable digitallandscape for all users[7, 26].2. COVML Safe Environment for Learning and Testing:Cybersecurity refers to the practice of protecting computer systems, networks, and data fromunauthorized access, damage, or theft. VM
Conference Session
Computing and Information Technology Division (CIT) Technical Session 3
Collection
2024 ASEE Annual Conference & Exposition
Authors
M Nazrul Islam, State University of New York, Farmingdale
Tagged Divisions
Computing and Information Technology Division (CIT)
, 5. Network security, 6. Operating systems security, 7. Cloud security, 8. Software security, 9. Vulnerability analysis, 10. Penetration testing/ethical hacking, 11. Risk management, 12. Digital forensics, 13. Cybersecurity law and policy.BiometricsBiometrics information is playing a significant role in the field of cybersecurity. Three majorareas of biometric information processing in cybersecurity are listed below. 1. Access control: Biometric information is used to verify and authenticate any individual requesting access to confidential information and/or a secure facility. 2. Forensics: Biometric information can be analyzed to identify the person responsible for a malicious activity. 3. Biometric
Conference Session
Computing and Information Technology Division (CIT) Technical Session 4
Collection
2024 ASEE Annual Conference & Exposition
Authors
Alejandra Noemi Vasquez, Tufts University; Trevion S Henderson, Tufts University; David Zabner, Tufts University
Tagged Divisions
Computing and Information Technology Division (CIT)
, focusingparticularly on manifestations of algorithmic thinking. Our work was guided by the followingresearch question:1. How are students’ algorithmic thinking skills manifested in their approaches to solving problems using programming? MethodsResearch SettingIn this research, we focus on one section of an introductory computer science course for first-year engineering students at a private, highly selective research university in the northeasternUnited States. Because the course is for engineering students, there is a heavy emphasis onmodeling, data analysis, and statistics. The course is also a testbed for the inclusion of ethics andsociotechnical thinking within engineering classrooms. The section in this study
Conference Session
Computing and Information Technology Division (CIT) Technical Session 6
Collection
2024 ASEE Annual Conference & Exposition
Authors
Sreekanth Gopi, Kennesaw State University; Nasrin Dehbozorgi, Kennesaw State University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology Division (CIT)
Conference Session
Computing and Information Technology Division (CIT) Technical Session 6
Collection
2024 ASEE Annual Conference & Exposition
Authors
Aadithyan Vijaya Raghavan, Cleveland State University; Chansu Yu, Cleveland State University
Tagged Divisions
Computing and Information Technology Division (CIT)
three attack vectors (4.4% of all theknowledge in the NICE Framework) TKSA Num- TKSA Description Phishing/Social Malware Web- ber Engineering Based Attacks K0003 Knowledge of laws, regulations, poli- * * * cies, and ethics as they relate to cyber- security and privacy. K0006 Knowledge of specific operational im- * * * pacts of cybersecurity lapses. K0066 Knowledge of Privacy