Asee peer logo
Displaying results 31 - 60 of 69 in total
Conference Session
Information and Network Security
Collection
2016 ASEE Annual Conference & Exposition
Authors
Chengcheng Li, University of Cincinnati; Rucha Kulkarni, University of Cincinnati
Tagged Divisions
Computing & Information Technology
andteaching the elementary, middle and high school students about internet safety and security wasgiven special importance during this period [10] [13]. They also have age appropriate resourcesfor kids . AFA has taken a step further to educate students on Cyber Security by organizingactivities for students from Elementary level. The ESCEI aims at teaching the students at theselevels about the importance of STEM education and careers in an interactive way. They designeddifferent modules for K-3 graders and for 4th to 6th graders.Cyber Security programs for Non IT StudentsCyber Security programs usually have multi disciplinary approach covering Management, Law,Business, psychology and Technology areas [18]. Though this course is considered ideal
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2011 ASEE Annual Conference & Exposition
Authors
Reza Sanati-Mehrizy, Utah Valley University; Evan Jackson; Ali Sanati-Mehrizy, Pennsylvania State University; Paymon Sanati-Mehrizy, University of Pennsylvania; Afsaneh Minaie, Utah Valley University
Tagged Divisions
Computing & Information Technology
AC 2011-2280: MOUNT TIMPANOGOS COMMUNITY SPECIES DATABASEDr. Reza Sanati-Mehrizy, Utah Valley University Reza Sanati-Mehrizy is a professor of Computer Science at Utah Valley University. His research interests include Data Structures, Databases, and Data Mining.Mr. Evan JacksonAli Sanati-Mehrizy, Pennsylvania State University Ali Sanati-Mehrizy is a medical student at the Milton S. Hershey Medical Center at Pennsylvania State University. His research interests include the application of mobile computing in the sciences. Upon completion of medical school, he hopes to pursue a career in Internal Medicine/Pediatrics with a further specialization in Hematology-Oncology.Paymon Sanati-Mehrizy, University of Pennsylvania
Conference Session
Potpourri
Collection
2015 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Ali Sanati-Mehrizy; Paymon Sanati-Mehrizy; Reza Sanati-Mehrizy, Utah Valley University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
lives, theopportunities for careers are expanding rapidly. A major challenge of this field is the trainingand education of a new generation of skilled workers. This paper studies different approachesthat are used by different institutions of higher education to integrate nanotechnology conceptsinto their curriculum.IntroductionNanotechnology is the science, engineering, and technology that deals with various structures ofmatter that have dimensions on the order of a billionth of a meter. Nanotechnology is the abilityto observe, manipulate, measure, and manufacture things at the nanoscale, which is about 1 to100 nanometers. While the word nanotechnology is new and was introduced in the late 1970s,the existence of functional devices and
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2015 ASEE Annual Conference & Exposition
Authors
Bushra Tawfiq Chowdhury, Virginia Tech; Sam Blanchard, Virginia Polytechnic Institute and State University; Kirk W Cameron; Aditya Johri, George Mason University
Tagged Divisions
Computing & Information Technology
used by dozens of research groups around the world. His power management software, Granola, is used by hundreds of thousands of people in more than 160 countries. Accolades for his work include NSF and DOE Career Awards, the IBM Faculty Award, and being named Innovator of the Week by Bloomberg Business week Magazine. Prof. Cameron received the Ph.D. in Computer Science from Louisiana State University (2000) and B.S. in Mathematics from the University of Florida (1994).Dr. Aditya Johri, George Mason University Aditya Johri is Associate Professor and Chair in the Applied Information Technology Department. Dr. Johri studies the use of information and communication technologies (ICT) for learning and knowledge
Conference Session
Emerging Computing and Information Technologies II
Collection
2015 ASEE Annual Conference & Exposition
Authors
Jessica Richards, BYU; Joseph J Ekstrom, Brigham Young University
Tagged Divisions
Computing & Information Technology
Technology. Because Information Technology sits adjacent to many otherdisciplines, it is imperative that IT education includes pedagogy that sensitizes students to thepotential for misunderstanding because of semantic differences in commonly used terms.While some more isolated fields still operate under the mindset that “their” definition of a term iscanon, someone in IT will work with other fields their entire career and therefore they mustrecognize the semantic shades of gray. It must also be recognized that when semantic dissonanceis encountered frequently, it is not enough to “roll with the punches.” Would you tell anInformation Security analyst to ignore potential virus threats until one actually infects amachine? Of course not! Clear
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2014 ASEE Annual Conference & Exposition
Authors
Reneta Davina Lansiquot, New York City College of Technology; Ashwin Satyanarayana, New York City College of Technology; Candido Cabo, New York City College of Technology/CUNY
Tagged Divisions
Computing & Information Technology
. We believe that the LC approach incorporates and builds on many of the Page 24.1334.3suggestions in the literature on how to facilitate transfer; moreover, it makes a statement, early inthe students’ academic careers, about the importance of connecting courses in the major andthose in general education so as to facilitate transfer. This LC also builds on previous researchshowing that introducing narrative elements into problem-solving courses improves studentperformance in general as well as in computer programming-related problem-solving skills.4,9We begin this paper by introducing the concept of a first-year LC, along with the
Conference Session
Communication Across the Divisions III: Writing as Social–Technical Integration
Collection
2015 ASEE Annual Conference & Exposition
Authors
Natascha M. Trellinger, Purdue University, West Lafayette; Rebecca R. Essig, Purdue University, West Lafayette; Cary D. Troy, Purdue University, West Lafayette; Brent K. Jesiek, Purdue University, West Lafayette; Josh Boyd, Purdue University, West Lafayette
Tagged Divisions
Computing & Information Technology, Liberal Education/Engineering & Society
Education and Electrical and Computer Engineering at Purdue University. He is also an Associate Director of Purdue’s Global En- gineering Program, leads the Global Engineering Education Collaboratory (GEEC) research group, and is the recipient of an NSF CAREER award to study boundary-spanning roles and competencies among early career engineers. He holds a B.S. in Electrical Engineering from Michigan Tech and M.S. and Ph.D. degrees in Science and Technology Studies (STS) from Virginia Tech. Dr. Jesiek draws on expertise from engineering, computing, and the social sciences to advance understanding of geographic, disciplinary, and historical variations in engineering education and practice.Prof. Josh Boyd, Brian Lamb School
Conference Session
Emerging Computing and Information Technologies I
Collection
2016 ASEE Annual Conference & Exposition
Authors
Douglas M. Schutz, Tokyo University of Science; Dante Dionne, Korean Air; Yong-Young Kim P.E., Konkuk University
Tagged Divisions
Computing & Information Technology
Hurricane Katrina. Previously, he served as an unre- stricted line officer in the U.S. Navy onboard a guided missile destroyer and the second Aegis cruiser.Prof. Dante Dionne, Korean Air Dante Dionne is an Organizational Leadership PhD candidate and a Senior Innovation Technology Man- ager at Korean Air. The past 20+ years of his career has centered on management and professional services consulting. Where, he has specialized in leading multi-national project teams in the design and implementation of digital marketing, mobility and innovative technology solutions. Dante holds an MA in Industrial/Organizational Psychology from the Chicago School of Professional Psychology and a BS in Business Management with a minor in
Conference Session
Emerging Computing and Information Technologies II
Collection
2017 ASEE Annual Conference & Exposition
Authors
Sushma Sanga, Bosch Inc; Ali Eydgahi, Eastern Michigan University
Tagged Divisions
Computing & Information Technology
Paper ID #19812Factors Affecting Identity Theft Anxiety Level in College StudentsDr. Sushma Sanga, Bosch IncDr. Ali Eydgahi, Eastern Michigan University Ali Eydgahi started his career in higher education as a faculty member at the Rensselaer Polytechnic In- stitute in 1985. Since then, he has been with the State University of New York, University of Maryland Eastern Shore, and Eastern Michigan University. During 2006-2010, he was Chair of the Department of Engineering and Aviation Sciences, Founder and Director of the Center for 3-D Visualization and Virtual Reality Applications, and Technical Director of the NASA funded
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2017 ASEE Annual Conference & Exposition
Authors
Stephany Coffman-Wolph, West Virginia University Institute of Technology
Tagged Divisions
Computing & Information Technology
designed tobe done without computers as access to a computer lab is often impractical, simply not available,or not easily transportable.Today with the popularity of smart phones and the increasing use of tablets in classrooms, mostkids, even very young kids, have interacted with a computer at some point. The activitiesdescribed in this paper are designed to go beyond simply teaching someone to program and arefocused on the concepts behind programming and those foundational concepts within the field ofcomputer science. The end goal of these activities is to introduce students to the “science” ofcomputer science. Most careers in computer science go beyond simply sitting aroundprogramming in a specific language and require many other skills (problem
Conference Session
Potpourri
Collection
2016 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Reza Sanati-Mehrizy, Utah Valley University
Tagged Divisions
Computing & Information Technology
problems have become more complicated andcomplex, requiring creative thinking and skilled engineers to solve these problems. To betterprepare our students in this area, the focus of our computer engineering capstone design coursehas been the design of embedded systems. By requiring an embedded design project in ourcapstone course, our students receive hand-on training in embedded systems that will enablethem for careers after graduation7.Senior Design Project Course at Utah Valley UniversityOur Senior Design Project Course serves as a project-oriented capstone course for computerengineering majors. This required course emphasizes major hardware and software co-design.This course satisfies the ABET (Accreditation Board for Engineering and
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2016 ASEE Annual Conference & Exposition
Authors
Yung-Hsiang Lu, Purdue University; Thomas J. Hacker, Purdue University, West Lafayette; Carla B. Zoltowski, Purdue University, West Lafayette; Jan P. Allebach, Purdue University, West Lafayette
Tagged Divisions
Computing & Information Technology
skills are essential for career development. However, in typicaluniversity settings, undergraduate students take different courses and work on different projects indifferent teams each semester. As a result, students lack opportunities to work on multi-yearprojects and develop the skills essential for long-term planning. To remedy this situation, ourdepartment has created elective courses that allow students from all years (first-year students tograduate students) to work on research projects under the supervision of faculty members and thementorship of senior graduate students. These projects provide the opportunities for students tolearn many skills essential in workplace, such as (1) understanding how projects are designed andmanaged; (2
Conference Session
Potpourri
Collection
2015 ASEE Annual Conference & Exposition
Authors
Joseph Alan Nygate, Rochester Institute of Technology (CAST); Richard Cliver, Rochester Institute of Technology (CAST)
Tagged Divisions
Computing & Information Technology
Page 26.929.3including: 1. Presenting and discussing a number of examples to get students intrigued by the power of infographics 2. Providing quantifiable metrics to measure the efficiency and accuracy of an infographic 3. Listing a small number of guidelines and best practices they should follow 4. Describing the process they should follow to integrate infographics within their documents 5. Applying these principles to analyze diagrams in their written assignments and in the class textbookThe objective was not to make the students experts in graphical design. Rather, it was to getthem interested in infographics and learn how they could be used to improve their assignmentsand increase their career readiness
Conference Session
Information and Network Security
Collection
2015 ASEE Annual Conference & Exposition
Authors
Chris Foreman, Purdue University, West Lafayette; Matthew Turner, Purdue University (Statewide Technology); Karl Perusich, Purdue Statewide Technology DO NOT USE DUPE
Tagged Divisions
Computing & Information Technology
), (2), some exposure(3), (4), expert understanding(5). 9. What is your level of understanding of ICS hardware/software, critical infrastructure, and the control of physical processes? Almost none(1), (2), some exposure(3), (4), expert understanding(5). 10. How likely are you to pursue a career that involves critical infrastructure cyber-security? Not likely(1), (2), unsure(3), (4), very likely(5).8. Final discussionThe outline for course modules and laboratory experiments has been presented, including thediagram for a hardware trainer. The key problems to be addressed are the gaps in CIS educationof ICS-specific cyber-security, the gaps in engineering education of cyber-security principles,and the siloed
Conference Session
Topics in Computing and Information Technologies I
Collection
2015 ASEE Annual Conference & Exposition
Authors
Joseph Benin, U.S. Coast Guard Academy; Scott Thomas Howie, United States Coast Guard Academy; Benjamin B Hannon, USCGA; Nicholas Williamson, United States Coast Guard Academy
Tagged Divisions
Computing & Information Technology
the cyber security realm within the Coast Guard and in the private sector after my military career. Page 26.1071.1 c American Society for Engineering Education, 2015 Learning IPv6: Becoming a Subject Matter Expert of a Technical Topic through a Year-Long Capstone Design ProjectIntroductionThe purpose of education remains the subject of much vigorous debate and discussion. Educationhas been a part of the development of humans from the earliest times to the present with manydifferent perspectives [1-4]. While university education contains many pedagogical aspects, theconcept of a
Conference Session
Computing & Information Technology Division Technical Session
Collection
2016 ASEE Annual Conference & Exposition
Authors
Mayari I. Serrano, Purdue University, West Lafayette; Alejandra J. Magana, Purdue University, West Lafayette; Baijian Yang, Purdue University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
1 Detail 1 1 1 - 1 1 1 - Question 4 did not received any answersDiscussion and Implications for Teaching and LearningThe results suggest that the participants possessed several misconceptions and conceptual gapson basic knowledge of how to secure a communication between the server and the web browser.This fact was unexpected given that the students were coursing the last year of aTelecommunication and Networking career. The results imply a necessity to strengthen generalsecurity and web security concepts on cybersecurity education as suggested by McGettrick [11] inhis work “Toward Effective Cybersecurity Education”.Third-party validation is a
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2016 ASEE Annual Conference & Exposition
Authors
Tanya Stanko P.E., Innopolis University; Marat Valiev, Innopolis University; Daniel Martin Johnston, Innopolis University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
. Savitskaya, Organization and Conducting of the Russian Unified State Examination in English: the Experience of Tomsk Region, Proceedings of the XXV annual international academic conference, language and culture, Tomsk 20-22 Oct 2014[3] T. Stanko, Why girls with interest in IT in high-school do not choose IT career - extended study, Proceedings of the ASEE Annual Conference, Seattle, USA June 14-18, 2015
Conference Session
POTPOURRI
Collection
2013 ASEE Annual Conference & Exposition
Authors
Duke Mejia Bulanon, Northwest Nazarene University; Stephen A. Parke P.E., Northwest Nazarene University
Tagged Divisions
Computing & Information Technology
interned with the IBM T.J. Watson Research Center, then spent the first several years of his career with IBM Microelectronics in Essex Junction, VT, where he worked in semiconductor R&D on five generations of IBM’s memory chip technologies. In 1989, he was awarded an IBM PhD Fellowship and began full-time study at the Uni- versity of California at Berkeley. He fabricated and studied nano-scale silicon-on-insulator transistors, and received the PhD degree from UC Berkeley in 1993. He transferred to the IBM Semiconductor R&D Center in Fishkill, NY where he became a team leader in the IBM/Toshiba/Siemens TRIAD multi- cultural technology development project. In 1996, he left IBM for an entrepreneurial academic start
Conference Session
Potpourri
Collection
2012 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Ali Sanati-Mehrizy, Pennsylvania State University; Paymon Sanati-Mehrizy, University of Pennsylvania; Reza Sanati-Mehrizy, Utah Valley University
Tagged Divisions
Computing & Information Technology
), Computer Engineering, DatabaseEngineering and Computer Networking. The Bachelor of Science in Computer Science programwas one of the first Bachelor of Science programs implemented at UVU in 1993. The program’sgoal has been to provide a quality program that meets accreditation standards while providing thestudents with a skill set that allows them to succeed in computing careers. The curriculumcontent for the Computer Science degree is based on the 2008 ACM Curriculum Report. TheComputer Science degree at UVU is accredited by Accreditation Board for Engineering andTechnology (ABET) in 2002 and currently has more than 500 students. To integrate wirelesssensor networks concepts into our curriculum, we decided to use the third model and
Conference Session
Potpourri
Collection
2012 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Ali Sanati-Mehrizy, Pennsylvania State University; Paymon Sanati-Mehrizy, University of Pennsylvania; Reza Sanati-Mehrizy, Utah Valley University
Tagged Divisions
Computing & Information Technology
a population of over 430,000 residents, 78% of which aremembers of the Church of Jesus Christ of Latter Day Saints. The Computer Science departmentat UVU offers a Bachelor’s Degree in Computer Science with four areas of specialization, whichinclude Computer Science (traditional), Computer Engineering, Database Engineering andComputer Networking. The Bachelor of Science in Computer Science program was one of thefirst Bachelor of Science programs implemented at UVU in 1993. The program’s goal has beento provide a quality program that meets accreditation standards while providing the students witha skill set that allows them to succeed in computing careers. The curriculum content for theComputer Science degree is based on the 2001 ACM
Conference Session
Emerging Information Technologies
Collection
2012 ASEE Annual Conference & Exposition
Authors
Robert E. Efimba P.E., Howard University; Tori Rhoulac Smith, Howard University
Tagged Divisions
Computing & Information Technology
in engineering disciplines, she shifted her career focus and now serves as an instructor and undergraduate education coordinator for the department. Her primary focus is now undergraduate teaching, advising, curriculum, and evaluation. Rhoulac Smith earned master’s of science and doctorate of philosophy degrees in civil engineering from North Carolina State University in Raleigh, N.C., in 2000 and 2003, respectively. She also earned a bachelor’s of science degree in civil engineering from Howard University in 1998. Page 25.1352.1 c American Society for Engineering Education, 2012
Conference Session
Embedded Systems and Mobile Computing
Collection
2014 ASEE Annual Conference & Exposition
Authors
Vamshi Krishna Bolly, Purdue University; John Springer, Purdue University, West Lafayette, IN, USA; J. Eric Dietz, Purdue University
Tagged Divisions
Computing & Information Technology
included restoration and recovery of critical infrastructure. Eric also led the creation of the Indiana Intelligence Fusion Center and the Indiana Fire Training System both new government functions that were created with new laws and funding. Retiring as a Lieutenant Colonel from the U.S. Army in 2004, Dr. Dietz led a number of Army Acquisition and research programs throughout his career including power systems, chemical sensors and command and control systems. An Indiana native, Eric was graduated in 1984 from Rose-Hulman Institute of Technology after earning a bachelor of science in chemical engineer- ing. He also earned a master’s of science from Rose-Hulman Institute of Technology in 1986 and a PhD in chemical
Conference Session
Communication Across the Divisions III: Writing as Social–Technical Integration
Collection
2015 ASEE Annual Conference & Exposition
Authors
Tatiana Teslenko, University of British Columbia, Vancouver
Tagged Divisions
Computing & Information Technology, Liberal Education/Engineering & Society
their professional career. However, there are much fewerattempts to introduce the theme of sustainability in first-year courses4,17, particularly in anengineering communication course.Graduate AttributesCommunication instruction at the Faculty of Applied Science started with a stand-alonemandatory second-year course, APSC 201: Technical Communication. The topics of this coursedid not include sustainability. At first the learning objectives were limited to CEAB graduateattributes outlined in Criteria 3.1.7 and 3.1.6: communication skills, as well as individual andteamwork skills. In 2010-11 they were expanded to include three additional attributes5 : 3.1.8
Conference Session
Emerging Computing and Information Technologies I
Collection
2016 ASEE Annual Conference & Exposition
Authors
Afrin Naz, West Virginia University Inst. of Tech.
Tagged Divisions
Computing & Information Technology
responsibilities, resolving conflict etc. At the end of each of the fourphases in the semester, each student is evaluated by his/her own team members.Ethics and contemporary issues The true test of engineering ethics education is how graduates behave in the workplace duringtheir careers, certainly a difficult outcome to measure a priori 8. Stephan8, in questioningwhether or not engineering ethics can be taught, quotes philosopher Michael Davis in giving fourgood things that can result if successful: (1) students can become more aware of the ethicalimplications of their work, (2) they can learn ethical standards, (3) they can become better judgesof ethical conduct, and (4) they can become more willing to put their ethical knowledge intoaction. ABET
Conference Session
Curricular Issues in Computing and Information Technolog Programs
Collection
2013 ASEE Annual Conference & Exposition
Authors
Camilo Vieira, Eafit; Alejandra J. Magana, Purdue University, West Lafayette
Tagged Divisions
Computing & Information Technology
science class in 10,000 US high schools by the year2016, uses teacher professional development programs as the main vehicle for accomplishingthis goal. Professional development programs provide opportunities for teachers to bring aboutchange in their classroom practices, attitudes and beliefs, and learning outcomes 5. Othercountries have begun to realize the same need of increasing the number of professionals optingfor a computing related career. The US model can be used as a framework for addressing thesame issue. Page 23.301.2Developing countries, such as Colombia, are not the exception. Colombia faces the possibility offalling behind if they do
Conference Session
POTPOURRI
Collection
2013 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Paymon Sanati-Mehrizy, Icahn School of Medicine at Mount Sinai; Ali Sanati-Mehrizy; Reza Sanati-Mehrizy, Utah Valley University
Tagged Divisions
Computing & Information Technology
computing careers. The curriculumcontent for the Computer Science degree is based on the 2008 ACM Curriculum Report. TheComputer Science degree at UVU is accredited by Accreditation Board for Engineering andTechnology (ABET) in 2002 and currently has more than 500 students.To integrate Computational Intelligence concepts into our curriculum, we decided to use the firstmodel by offering an undergraduate course on Artificial Neural Networks. This course wasoffered as a senior level elective course for the first time in the Fall 2012 semester. Offering this Page 23.316.13course as a required course was not an option for us, so not every student is
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2014 ASEE Annual Conference & Exposition
Authors
Francis Giraldeau, Polytechnique Montreal; Michel R. Dagenais, Ecole Polytechnique de Montreal; Hanifa Boucheneb, École Polytechnique de Montréal
Tagged Divisions
Computing & Information Technology
model ofthe whole computer in order to make important design decisions throughout their career. Onemajor challenge in teaching operating systems is the complex, intangible, and nondeterministicnature of an actual computer system containing many cores operating in parallel.We propose a global approach to address this challenge involving a full-scale open source operatingsystem, a carefully designed set of experiments and novel execution visualization tools. In orderto deconstruct their preconceptions, students are exposed to phenomena that seem contradictoryat first glance, but are the result of the interaction between the microarchitecture, the operatingsystem and the libraries. In the spirit of constructivism, students are invited to observe
Conference Session
Information and Network Security
Collection
2014 ASEE Annual Conference & Exposition
Authors
Usman Ghani, DeVry University; Ahmed S. Khan, DeVry University, DuPage
Tagged Divisions
Computing & Information Technology
Paper ID #8523The Effect of Feedback Mechanisms on Students’ Learning in the Use ofSimulation-based IT Training in a Computer Networking ProgramDr. Usman Ghani, DeVry University Usman Ghani Senior Professor DeVry University College of Engineering and Information Science Usman Ghani is a senior professor of Network and Communication Management in the College of En- gineering and Information Science at DeVry University, Addison, Illinois. Professor Ghani’s area of specialization is ’Network Infrastructure and Security’. Mr. Ghani began his career as an Electronics Engineer for Johnson Controls, Inc. in Milwaukee, Wisconsin
Conference Session
Information and Network Security
Collection
2013 ASEE Annual Conference & Exposition
Authors
Krystal S Corbett, Cyber Innovation Center; Chuck Gardner, New Orleans Military and Maritime Academy; Anthony Joseph Taffaro Jr., New Orleans Military and Maritime Academy; Marvin Nelson, Benton High School
Tagged Divisions
Computing & Information Technology
Paper ID #7468Piloting a New Curriculum: A View from the TrenchesDr. Krystal S Corbett, Cyber Innovation CenterDr. Chuck Gardner, New Orleans Military and Maritime AcademyMr. Anthony Joseph Taffaro Jr., New Orleans Military and Maritime Academy Mr. Anthony Joseph Taffaro, Jr. is a native of New Orleans, Louisiana, and has resided in the New Orleans area his entire life. Mr. Taffaro is a graduate of Jesuit High School New Orleans and Tulane University. At Tulane, Mr. Taffaro received Bachelor of Arts in Social Sciences and a minor in Business Studies. Mr. Taffaro spent much of his career in the banking industry and entered
Conference Session
Curricular Issues in Computing
Collection
2017 ASEE Annual Conference & Exposition
Authors
Joshua Levi Weese, Kansas State University; Russell Feldhausen, Kansas State University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
infuses CT, as well as reliable methods for assessing CT, remain open problems. In this paper, we describe a 5th-9th grade STEM outreach program. Classes on micro controllers and computer programming are presented. Data collected through a newly designed self-efficacy instrument is used to determine effectiveness of these curricula at improving confidence in CT and problem solving skills.IntroductionThis paper describes a STEM outreach program where the Manhattan-Ogden Unified SchoolDistrict 383 has partnered with Kansas State University. This program lasts four weeks and isdesigned to expose 5th-9th grade students to STEM careers and subjects through hands-onactivities. The program covers a large range of areas