Paper ID #16620The Development of Ethical Reasoning: A Comparison of Online versus Hy-brid Delivery Modes of Ethics InstructionDr. Justin L. Hess, Purdue University, West Lafayette Justin L. Hess received his PhD from Purdue University’s School of Engineering Education along with his Master’s of Science and Bachelor of Science from Purdue’s School of Civil Engineering. Justin is currently a Postdoctoral Researcher in the STEM Education Research Institute at IUPUI. Justin’s research interests include developing pedagogical strategies to improve STEM students’ ethical reasoning skills; exploring the role of empathy within
Paper ID #16625Ethical Issues in Computing: Student Perceptions SurveyDr. Ali Salehnia, South Dakota State University Professor of Computer Science, South Dakota State University. Computer Science Faculty since 1982. Published more than 40 peer reviewed papers. Supervised more than 30 Master’s Degree thesis and research/design papers. Served on more than 60 Master’s and Ph.D. students’ graduate committees.Shieva Salehnia c American Society for Engineering Education, 2016 Ethical Issues in Computing: Students’ Perceptions Survey Ali Salehnia
Society for Engineering Education, 2016 Embedding ABET’s outcomes in a software engineering courseIntroduction The Accreditation Board for Engineering and Technology (ABET) is the leader in assuringquality and stimulating innovation in applied science, computing, engineering, and engineeringtechnology education. One aspect of the enhanced ABET criteria (published in 2000) is “anunderstanding of professional responsibility.” In ABET student learning outcomes forcomputing, Outcomes d to h (i.e., communication, teamwork, impacts of computing, ethics andprofessional development) are identified as “professional skills.” In most undergraduate computing and engineering programs, students do not haveopportunities to be exposed to the
student may be appropriate. All students wishingto take this course must also submit an Ethics Agreement to reinforce the ethics expected of acybersecurity professional. An example of a cybersecurity course Ethics Agreement can befound in Appendix A.Learning OutcomesThe Social Engineering course learning outcomes include the following: 1. Explain the various techniques that can be used to complete Social Engineering exploits. 2. Develop an understanding of the psychology of human interaction and how it can be exploited for gain. 3. Learn what technical controls, trainings, and processes can be used to help defend and establish security in-depth to protect against Social Engineering. 4. Overcome uncomfortable feelings such as
of word choices in missionstatements compared across public and private engineering colleges in the United States. Theresearch questions driving this study are: 1. Which words are most frequently used in missionstatements for private and public engineering colleges in the U.S.? 2. For six pre-determinedcategories of interest that each word may represent (eg. related to global, service, pedagogy,research, ethics, and diversity), what similarities and differences are noted in occurrences of eachof the six categories across the two settings of public and private colleges?BackgroundTo help situate this research study, in this section, a discussion drawing from two bodies ofliterature is presented. The first part of this discussion focusses on
- Page 26.787.3professionalism, 3.1.9 - ethics and equity, and 3.1.12 - life-long learning1. These new objectivesresulted in the inclusion of the discourse on sustainability and social learning and an in-depthdiscussion of integrative skills (a.k.a. “soft” skills).The New First-Year CourseLater we developed a first-year course with a theme of sustainability, APSC 176: EngineeringCommunication. Its objectives are to provide students with research, critical thinking andadvanced communication skills necessary for success in the study and practice of globalengineering.We believe that a first-year communication course is uniquely positioned for integratingeducation on sustainability (ESD) with graduate attributes. APSC 176: EngineeringCommunication
Objectivesevolve. To complete the program of study for the BS-CS, every student will a) Demonstrate proficiency in the foundation areas of Computer Science including discrete structures, logic and the theory of algorithms. b) Demonstrate proficiency in various areas of Computer Science including data structures and algorithms, concepts of programming languages and computer systems. c) Demonstrate proficiency in problem solving and application of software engineering techniques. d) Demonstrate mastery of at least one modern programming language and proficiency in at least one other. e) Demonstrate understanding of the social and ethical concerns of the practicing computer scientist. f) Demonstrate the ability to work cooperatively in teams. g
COMPLIANCE SOFTWARE DEVELOPMENT PROBLEM: IMPORTANCE AND POSSIBLE SOLUTIONS AbstractSuccessful modern software development often requires compliance with both ethical andlegal standards. This creates the “computer compliance software problem”. That isdefined and discussed together with reasons for its importance. Some possible solutionapproaches are defined and discussed, with some related examples. There have been a fewwell documented past software disasters, and there exist recent but undocumented softwaredisasters, but there are reasons for hope that progress is being made toward solving thecompliance software development problem and some are briefly discussed. Hope resides ingreater software knowledge
theirclassroom knowledge of IPv4 and its ancillary components to the realm of IPv6 and in so doinglearned valuable lessons for the Coast Guard at large while improving the infrastructure of theAcademy’s engineering educational network.The Course: Capstone Projects in Electrical EngineeringThe fall semester course description reads [7]: This is the first of two capstone courses in Electrical Engineering during the senior year. The focus of this course will be taking students through the first half of the Engineering Design Cycle. Classroom discussions will focus on the engineering design process including needs identification, system requirements, system design process and engineering ethics. Additional lectures will center on
, where he teaches general literature, science fiction, composition (both beginning and advanced), ethics, and public speak- ing. He has a Ph.D. in English from the University of California, Santa Barbara (1994). His dissertation was about the portrayal of science in postmodernist fiction. He has published scholarly articles on science fiction, literature, television, film, and music. His most recent work includes a paper presented at two conferences about the design of university-level science fiction courses, using science fiction to teach the ethics of technology. He also gave a talk on Doctor Who and the critique of capitalism. At the end of 2011, his book on the humanism of Doctor Who will be published
such asusing library resources efficiently, ethics in research, scientific communication skills,information about applying to and planning for graduate education, funding sources forgraduate education, and industry careers. The students also participated in social events suchas a welcome picnic and a trip to a state park.Literature ReviewResearchers have found that educational benefits to students participating in undergraduateresearch experiences are improvements in communication and research skills, ability toperform teamwork, and motivation to pursue advanced degrees (Bauer & Bennett, 2003;Lopatto, 2004; 2007). Large gains in “clarification or confirmation of career/education paths”and personal/professional domains (such as “thinking
ledby the education director of ASSIST and including faculty representative from each engineeringdepartment at the University. This minor requires 18 credit hours, which includes a junior levelrequired introductory course, three technical electives, and two general education electivesemphasizing diversity, ethics, and global issues. The technical electives come from a variety ofengineering departments and taught by faculty performing research in nanoscience andtechnology. Students are required to choose at least one technical elective outside of their homedepartment. From their preliminary evaluation results of their introductory course indicates thatstudents’ attitude toward nanoscience and technology is positive. Students from
groups or team projects. 5. Demonstrate an ability to understand professional, ethical and social responsibilities, including the impacts of culture, diversity, and interpersonal relations. 6. Demonstrate proficiency in communicating technical information in formal reports, documentation, and presentations to users and information technology professionals. 7. Demonstrate the ability to identify and analyze the impacts of information technologies and computing on public, organizations, and individuals. 8. Demonstrate the ability to identify and apply current and emerging technologies and tools for information technologies solutions. 9. Demonstrate expertise in the core information technologies data base
-world problems and global challenges. They will demonstrate the ability to recognize opportunity and to take initiative in developing solutions applying the principles of human centered design. Students will be able to communicate effectively and to work well on teams. We examine problems and solutions from societal, cultural, and ethical perspectives. Gateway to Technology Leadership and Innovation o This course serves as an introduction to the various Technology Leadership & Innovation (TLI) programs. Students study the interface between technology and people, while developing strategies to lead, innovate, and solve problems in a
CR) • CS 1400 Fundamentals of Programming • CS 1410 Object-Oriented Programming • CS 2300 Discrete Structures I • CS 2420 Into to Algorithms and Data Structures • CS 2450 Software Engineering • CS 2600 Computer Networks I • CS 2810 Computer Organization and Architecture • CS 305G Global Social & Ethical Issues in Computing • CS 3060 Operating Systems Theory • CS 4380 Advanced/High-Performance Computer ArchitectureECE Requirements (38 CR) • ECE 1020 Computer Engineering Problem Solving with Matlab & Labview • ECE 2250 Circuit Theory • ECE 2255 Circuit Theory Lab • ECE 2700 Digital Design I • ECE
Magnetic Resonance Imaging (MRI) Personal Genomics: Some of the Ethical, Legal and Social Issues (ELSI) Involved With Personal Genomics.These topics will be addressed in detail, including some homework assignments, in the nextsection.Course ContentDNA has been known to be the molecule composing cellular genomes for over half a century,yet the details of exactly how the bases of DNA (adenine, guanine, thymine , and cytosine) codefor all of the traits observed in living organisms are still being elucidated. The majority of thetopics discussed during the class allowed both the engineering and biology students to explorevarious mathematical and computer techniques for analyzing DNA sequences and determiningtheir functions.We viewed the DNA as
over to view these competitions and discuss onvarious ethical issues on privacy and security and give their valuable advises to the youngcompetitors. CTF competitions are conducted at college as well as high school level. CTFs are ofdifferent types. The most common types of CTFs are:Jeopardy: In this type of contest, teams have to solve a set of challenges from diverse areas suchas Cryptography, Forensics Reverse engineering etc.Attack-Defense: As the name suggests, this is an attack, Defense game meaning some teams tryto attack and the other teams try to defend from attacks.Mixed Competitions: Change formats.CTF competitions train the participants to protect their systems from cyber attacks. Thechallenges are mainly on fixing vulnerabilities
engineering (e.g., teamwork, communication, ethics, inclusiveness anddiversity, new ideas/business development). The development of these professional skills arealso integrated into all courses within the curriculum.Curriculum Design Approach We are using a combination of instructional systems and the “Backwards Approach (BA)”to design GalvanizeU/UNH curricula. As a field, instructional design is historically andtraditionally rooted in cognitive and behavioral psychology, though recently constructivism(learning theory) has influenced thinking in the field. Instructional Systems Design (ISD) orsimply instructional design8 is the practice of creating "instructional experiences which make theacquisition of knowledge and skill more efficient
not be true. We have added some catalyst strategies during class study, the observation is very interesting. Third, collaboration and ethics. WReSTT-CyLE is an environment that emphasizes the collaborative learning strategy through a team based approach. At the same time, as an online learning environment, out of class study would be suitable for students and is one of the main purposes of this project. Does the organic collaboration bring efficient results and learning outcomes? Does gamification emphasize independent and team wide learning? Is each team learning on an independent based XP? If some of the answers to the above questions are no, how do we adjust the bias in the results?After the study, we retrieved the data and
State University. His research interests are in the areas of Nanotechnology, Fiber Optic Communications, Faculty Development, Application of Telecom- munications Technologies in Distance Education, and Social and Ethical Implications of Technology. He is the author of many educational papers and presentations. He has authored/coauthored the following books: • Nanotechnology: Ethical and Social Implications (2012) • Technology and Society: Issues for the 21st Century and Beyond 3E, (2008) • The Telecommunications Fact Book and Illustrated Dictionary 2E (2006) • Fiber Optic Communication: An Applied Approach, Prentice Hall, N.J.(2002) • Technology and Society: A Bridge to the 21st Century (2002) • Technology and
discuss artificial intelligence through computer science usingheuristics. Additionally, the students debate the ethics associated with artificial intelligence andwhen legal rights should apply to artificial beings.Teachers attend a week-long, immersive professional development workshop for Cyber Sciencethe summer prior to teaching the course6. Following the professional development workshopteachers gain access to all curriculum materials including lesson plans, master notes, andsupplemental documents which are found on NICERC’s website. Communication is maintainedthroughout the school year via the website allowing for any questions, concerns, or issues ateacher may experience when teaching the material.Narrative #1 – High School Teachers
; the ability to demonstrate ethical judgment andintegrity; intercultural skills; the capacity for continued learning, and general breadth of skillsand knowledge 5. Thus, having disciplinary knowledge is not enough. Today’s workplacerequires applying such knowledge towards analysis, decision-making, and problem solvingwithin a complex environment6-8. 2Formal Education and Computing Professionals’ Needs It is therefore unsurprising that, in the Computing Science Curricula 2013 final report, theJoint Task Force on Computing Curricula9 stated that The education that undergraduates in computer science receive must adequately prepare
the EPICS Program at Purdue University. She received her B.S. and M.S. in electrical engineering and Ph.D. in engineering education, all from Purdue University. She has served as a lecturer in Purdue’s School of Electrical and Computer Engineering. Dr. Zoltowski’s academic and research interests broadly include the professional formation of engineers and diversity and inclusion in engineering, with specific interests in human-centered design, engineering ethics, leadership, service-learning, assistive-technology, and accessibility.Prof. Jan P. Allebach, Purdue University, West Lafayette Jan P. Allebach is Hewlett-Packard Distinguished Professor of Electrical and Computer Engineering at Purdue University. Allebach
, Planning Required existing systems, and organization. 4. Designing appropriate solutions that satisfy and integrate Planning, Metrics Required ethical, social, legal, and economic concerns. 5. Learning to apply theories, models, and techniques to Planning, Metrics Required identify problems, implement solutions and verify results. 6. Understanding the importance of negotiation, effective Topics Adequately Cover work habits, leadership, and good communication. 7. Learning emerging models, techniques, and technologies as they emerge and the
Paper ID #12821Automated and scalable assessment: present and futureDr. Edward F. Gehringer, North Carolina State University Dr. Gehringer is an associate professor in the Departments of Computer Science, and Electrical & Computer Engineering. His research interests include computerized assessment systems, and the use of natural-language processing to improve the quality of reviewing. He teaches courses in the area of programming, computer architecture, object-oriented design, and ethics in computing. He is the lead PI on a multi-institution NSF IUSE grant to construct web services for online peer-review systems
IPSec Figure 2 - Example of Man-In-The-Middle SCADA Attack LabSCADA security modules such as these should be performed with the ethical intent tounderstand and prepare against attacks on SCADA systems. Modules such as these may solidifyunderstanding of SCADA systems, and provide ways to interest students in performingundertaking further research. Page 25.877.5Conclusion and Future ResearchAs security of large scale embedded systems becomes more of a focus in academia, there will bea new challenge in how to educate students on these kinds of environments. The history of thiseducation has been spread across disciplines
• Organization & Industry • Metacognition • Professional • Reflection and self-‐assessment • Ethical • Information and media literacy • Legal • Professional development • Security 10. INNOVATION / CREATIVE THINKING • Social • New and novel solutions to problems 5. PROBLEM SOLVING AND CRITICAL • Risk
courses in Com- puter Science, Information Systems, and Data Analytics. He has a special interest in ethical conducts in multicultural settings. c American Society for Engineering Education, 2016 Journey to Accreditation: Assessment Made Easy Alireza Farahani Mudasser F. Wyne Lu Zhang School of Engineering and Computing National University San Diego, CA, USAAbstractAssessment is a scientific measure for assessing learning abilities of students. It measuresstudents understanding of concepts and/or procedures by having to show what studentshave learned. Data
design, engineering ethics, leadership, service-learning, and accessibility and assistive-technology.Dr. Yung-Hsiang Lu, Purdue University Yung-Hsiang Lu is an associate professor in the School of Electrical and Computer Engineering and (by courtesy) the Department of Computer Science of Purdue University. He is an ACM distinguished scientist and ACM distinguished speaker. He is a member in the organizing committee of the IEEE Rebooting Computing Initiative. He is the lead organizer of the first Low-Power Image Recognition Challenge in 2015, the chair (2014-2016) of the Multimedia Communication Systems Interest Group in IEEE Multimedia Communications Technical Committee. He obtained the Ph.D. from the Department of
total number of students in the electronic sort. Students not sortedby the algorithm are accounted for in a numeric difference between the two assignmentprocedures. If the overall agreement was 50% or greater, then the assignment algorithm wasconsidered a refinement. In general, the natural subjectivity of the DMs in addition to criteria notaccounted for in the algorithm, such as the work ethic of students, would result in deviationsbetween the objective automatic assignment and the manual assignment. Additionally, thisalgorithm was never designed to generate a finalized output. Instead, it was develop to serve as aplatform to improve the efficiency of the assignment process. Further modifications by each DMwas expected after they receive the