Asee peer logo
Displaying all 2 results
Conference Session
Curricular Issues in Computing and Information Technolog Programs
Collection
2013 ASEE Annual Conference & Exposition
Authors
James P Cohoon, University of Virginia; J. McGrath Cohoon, University of Virginia; Luther A Tychonievich, University of Virginia; Catherine E. Brawner, Research Triangle Educational Consultants
Tagged Divisions
Computing & Information Technology
Research Triangle Park Evaluators, an American Evaluation Association affiliate organization and is a member of the Amer- ican Educational Research Association and American Evaluation Association, in addition to ASEE. Dr. Brawner is also an Extension Services Consultant for the National Center for Women in Information Technology (NCWIT) and, in that role, advises computer science departments on diversifying their un- dergraduate student population. She currently serves as the principal evaluator for the Teachers Attracting Girls to Computer Science project which aims to increase and diversify the student population studying computer science in high school. Dr. Brawner previously served as principal evaluator of the NSF
Conference Session
Emerging Computing and Information Technologies II
Collection
2016 ASEE Annual Conference & Exposition
Authors
Samuel Moses, Brigham Young University; Nathaniel Scott Baker; Dale C. Rowe, Brigham Young University
Tagged Divisions
Computing & Information Technology
-Scholastic CollaborationThe new challenges facing the world of cybersecurity are diverse and require many differentframes of mind to overcome. Collaboration and curriculum-sharing between universities is keyin order to meet the demands of the industry; the NSA places significance on this collaborationfor all its Centers of Academic Excellence. While the authors have geared this course of studytowards students working on their graduate degrees, the framework presented above could beeasily used to create a scaled-down course for undergraduate or even high school students.Social Engineering ForensicsWith a basic understanding of Social Engineering and some experience writing policy against it,students should become very aware of how likely it is that