can preserve the usage basis of her intellectual property by encapsulating hereObject. Subsequent changes to the eObject, or its inclusion in curricula, can be establishedby provenance and encapsulation validation.The authors posit that these perceived challenges can be leveraged to produce a vibrantacademic infrastructure for distance learners where eObjects are properly vetted andwhose provenance can be established.Recommendations for Future ResearchImmediate plans are under development to facilitate an experimental environment for 1)authenticating eObject creators, vettors and learners/users; and 2) establishing the provenancetracking and encapsulation processes for eObjects.Acknowledgements Proceedings of the 2015 American Society for
. Planned work force development has helped in thepast for the job market at a specific point in time. The work force in the past two centuries wasgenerally geared towards industry needs based on conformity rather than creativity. Among thewell-known educational paradigms were behaviorism, constructivism, and cognitivist theory.B. F. Skinner, one of the main proponents of behaviorism, developed his idea of stimulusresponse and the role of reinforcement8, 9 in the learning theory. He argued that a human actionis the result of the consequences of the same action. If the consequences are positive the actionthat led to it is likely to be repeated; if the consequences are negative, the action is not likely tobe repeated. According to behaviorism, a
documents (e.g., test plans and test reports) so as to better meet ABET Outcome 3g.This team-teaching initiative was implemented in a single section of capstone; over several yearsthe initiative proved to be successful as student presentations and documentation demonstratedmeasurable improvement as assessed at the beginning and the end of each term. Therefore, team-teaching was implemented throughout the capstone courses, so that by 2009 all sections of seniordesign capstone were team-taught by pairs of AE/ME and COM faculty2.Embedding a COM instructor in each AE/ME capstone course provided students with an in-classresource regarding communication or teamwork skills. Communication instruction was tailoredto the specific capstone project and
California and one in Henderson, Nevada, and online. At National University, Proceedings of the 2015 American Society for Engineering Education Pacific Southwest Conference Copyright © 2015, American Society for Engineering Education 207courses are taught in a one-course-per-month format, giving students the ability to focus onlearning one course at a time and the flexibility to pursue an academic plan at their own pace.Since the BS Computer Science degree was first awarded by National University thirty-one yearsago, the program has continually evolved to align with the improvements and innovations madein field of
305 Accreditation Board in Engineering and Technology (ABET). Then we identify topics in the ACM curriculum for Information Technology that are relevant to Big Data concepts and map them to a specific undergraduate program. We also present the courses in a masters level program in Information Technology and examine the relevance of these courses to Big Data education. present a short review of the curriculum of Information Technology in a typical four-year undergraduate and graduate levels today. We then identify courses that are relevant to concepts in Big Data. We present the current scope of the Big Data industry and the core concepts of Big Data technology. This is then followed by a plan for adoption of the Big Data concepts in to
ResearchThe authors plan to expand the data set presented in this paper to include a much larger numberof respondents. The current working concept is to contact the 181 schools designated asNational Security Agency (NSA) and Department of Homeland Security (DHS) Centers ofAcademic Excellence requesting their participation. Increasing the number of respondentsupward toward 100 in number would allow a more statistically valid analysis.AcknowledgementsThe authors wish to thank the editors and staff of the Pearson Education Computer Sciencedivision for their assistance in identifying survey participants and support of the survey process.Bibliography1. Padman, V. & Memon N. (2002). Design of A Virtual Laboratory for Information Assurance Education
September 25, 2013, from http://www.whitehouse.gov/the-press-office/2012/01/24/remarks-president-state-union-address17. Executive Office of the President President’s Council of Advisors on Science and Technology (2011). Report to the President on Ensuring American Leadership in Advanced Manufacturing, p.9. Retrieved September 25, 2013, from http://www.whitehouse.gov/sites/default/files/microsites/ostp/pcast-advanced- manufacturing-june2011.pdf18. The Boston Consulting Group (2013). Majority of Large Manufacturers Are Now Planning or Considering ‘Reshoring’ from China to the U.S. Retrieved September 25, 2013, from http://www.bcg.com/media/PressReleaseDetails.aspx?id=tcm:12-14494419. Sirkin, H. L., Zinser, M., and
navigating andinteracting with the website in real time, allowing to detect fraudulent or suspicious behavior.These tools send alert to phones when there is suspicious activity, allowing management to actquickly and prevent suspicious behavior from causing harm. Security personnel need to monitorregularly the host servers for malware, viruses, and other harmful software, and make sure theweb host system has procedure in place that includes daily scanning, detection and removal ofmalware and viruses on the website. One needs to certain that the host server has back-up systemto data back-up regularly, and has disaster recovery plan in place.5.13 PCI scans and system PatchExperts recommends quarterly Payment Card Industry (PCI) scans through