Asee peer logo
Displaying results 31 - 42 of 42 in total
Conference Session
Emerging Computing and Information Technologies II
Collection
2017 ASEE Annual Conference & Exposition
Authors
Alex Daniel Edgcomb, zyBooks; Frank Vahid, University of California, Riverside; Roman Lysecky, University of Arizona; Susan Lysecky, zyBooks
Tagged Divisions
Computing & Information Technology
completion rates between the participation activities and the codingexercises is likely due to the increased difficulty of the coding exercises, coupled with solutionsnot being immediately accessible to students. Unfortunately, solutions are improperly madeavailable via some websites, a practice of questionable ethics, but finding those solutionsrequires some search effort by students.Figure 2: Percent of participation activities completed across 10 courses The completion rate was about 83%, as long as some course points were awarded.After conducting the above analysis, we decided to see how the completion rate varied for thefirst four chapters. Figure 3 shows the percent of homeworks completed, for courses thatawarded 0 course
Conference Session
Information and Network Security
Collection
2014 ASEE Annual Conference & Exposition
Authors
Richard Scott Bell, Kansas State University; Eugene Y. Vasserman, Kansas State University; Eleanor C. Sayre, Kansas State University
Tagged Divisions
Computing & Information Technology
, mobile computing, networks, operatingsystems, digital forensics, philosophy/ethics, programming languages, software engineering,statistics/probability, and web programming 18 . Course content may range from cryptography, andthe mathematical principles and algorithms used to protect data to system-level protocols 4 .Additionally, the goals of courses vary dramatically, such as teaching cybersecurity as practicalvocation skills, as good engineering practices, or as academic theories.The methods used to teach these courses are just as varied as their goals. Some courses focus onlaboratory-based, experimental operations 6,14 . Others are lecture-based and involve the reviewand discussion of literature, and still others are challenge based courses
Conference Session
Emerging Information Technologies
Collection
2011 ASEE Annual Conference & Exposition
Authors
Don Chen, University of North Carolina, Charlotte; Bruce Gehrig, University of North Carolina, Charlotte
Tagged Divisions
Computing & Information Technology
. The knowledge and skills associated with project administration include: a. understanding project delivery processes; b. applying principles of construction law and ethics; c. understanding contractor licensing requirements and procedures; d. understanding lien and labor laws as applied to construction; e. identifying appropriate construction codes and regulations; f. developing quality control programs and plans; Page 22.818.6 g. performing economic analyses and developing cash flow projections; and h. managing risks on a construction project.IV. The knowledge and skills associated with contract documents
Conference Session
Information and Network Security
Collection
2014 ASEE Annual Conference & Exposition
Authors
Manghui Tu, Purdue University Calumet; Shiming Xue, Purdue University Calumet
Tagged Divisions
Computing & Information Technology
, programming, testing ofvarious applications installed, as well as ethical hacking and incident investigation in thevirtualized Linux environments. All these will provide students with in-depth knowledge andskills in cloud computing and information assurance. More important, research results can benaturally integrated with the existing Computer Information Technology curriculum, whichcan benefit students in the CIT program at Purdue University Calumet (PUC) and students inthe programs that have partnerships with PUC in the Midwest.6. ConclusionIn this paper, a systematic approach has been proposed to develop the forensics readiness tofight against attacks and inside activities committed in virtualized Linux environments. Thisapproach focuses on
Conference Session
Emerging Computing and Information Technologies I
Collection
2016 ASEE Annual Conference & Exposition
Authors
Douglas M. Schutz, Tokyo University of Science; Dante Dionne, Korean Air; Yong-Young Kim P.E., Konkuk University
Tagged Divisions
Computing & Information Technology
Collaboration of Working Groups in Global Airline Operations: Leveraging Smartphone Push-To-Talk Functionalities. in 10th Annual IEEE IT Professional Conference, The College of New Jersey. 2015. Computer Society Chapter of Princeton and the Princeton Chapter of the ACM (Association for Computing Machinery): IEEE (Institute of Electrical and Electronics Engineers)39. Cohn, A., et al., Analysis of the Potential for Delay Propagation in Passenger Airline Networks. 2007.40. Fernando, A.C., Business ethics and corporate governance. 2010: Pearson Education India.41. Gomes Da Costa, A.C., Por uma pedagogia da presenca [For a pedagogy of presence]. Brasilia: Fundacao Centro Brasileiro para a Infacia e Adolescéncia (FCBIA
Conference Session
Emerging Computing and Information Technologies II
Collection
2016 ASEE Annual Conference & Exposition
Authors
Yujian Fu P.E., Alabama A&M University; Peter J. Clarke, Florida International University; Nelson Barnes Jr, Alabama A&M University
Tagged Divisions
Computing & Information Technology
software testing techniques. This preparationshould increase the students’ chances of success in both creating testable requirements for theirapplications as well as creating adequate test cases.CS/CMP 403 – Senior Problem This is capstone course of Computer Science at AAMU and a continuation of CS/CMP401 (software engineering). During this course, the student is expected to code a single,meaningful project started earlier in CS/CMP 401 and present the results of this project in class.This project must meet a set of standards for software design and documentation. Topics ofprofessional ethics and responsibilities are discussed in the class. Software-testing techniquesmust be used in this course on the selected project to ensure the quality
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2014 ASEE Annual Conference & Exposition
Authors
Osvaldo Mangual, Honeywell Aerospace; Marvi Teixeira, Polytechnic University of Puerto Rico; Reynaldo Lopez-Roig, Polytechnic University of Puerto Rico; Felix Javier Nevarez-Ayala, Polytechnic University of Puerto Rico
Tagged Divisions
Computing & Information Technology
Conference Session
Emerging Information Technologies
Collection
2011 ASEE Annual Conference & Exposition
Authors
Abul K. M. Azad, Northern Illinois University
Tagged Divisions
Computing & Information Technology
thedeveloped facility as well as evaluate the student learning outcomes. To address these issuesthe evaluation process is divided into four parts: a) assess students’ learning outcomes; b)assess students’ learning behavior in terms of the access time and duration of use (in terms ofthe use of the facility); c) assess the effectiveness of the facility and students’ perceptionabout the facility; and d) assess ethical issues. The first two are achieved through quantitativeanalysis, while the last one is done through qualitative analysis. Professor Herbert J.Walberg, Research Professor of Education and Psychology at the University of Illinois atChicago and Visiting Professor at Stanford University, acted as the external evaluator. He isa world renowned
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2011 ASEE Annual Conference & Exposition
Authors
Joseph Idziorek, Iowa State University; Mark F. Tannian, Iowa State University; Douglas W. Jacobson, Iowa State University
Tagged Divisions
Computing & Information Technology
avoid. An appreciation of the offensive mindset helps the student develop the wisdomnecessary to be an effective last line of defense after their investments in mitigation like anti-virus software, firewalls and patching fails. Understanding that they are the target the attacker istrying to exploit improves their chances of thwarting social engineering attacks (e.g. phishing,spear phishing, Trojan horse, drive-by downloads, scareware, ransomware) that have been highlysuccessful. As responsible educators, we ensure ethics discussions encapsulate the presentation Page 22.1379.7of offensive methods in order to avoid encouraging malicious cyber
Conference Session
Emerging Information Technologies
Collection
2011 ASEE Annual Conference & Exposition
Authors
Barbara E. Brazon, Penn State University; Mary Lynn Brannon, Pennsylvania State University, University Park
Tagged Divisions
Computing & Information Technology
statedthat they rarely thought about the perceptions of group members to their work ethic, attitudes andcompetency prior to this course. A few of the students noted that after the first couple of reviewsby their peers they became more actively engaged as a direct result of evaluations providedthroughout the project. See Appendix B for the Student Performance Evaluation Form.Prior to being evaluated by the manger the students were required to perform a self-evaluationusing the Student Performance Evaluation Form, which is then reviewed with the manager forhis/her input. Students were evaluated a minimum of four times during the course of the project.Students also noted in their Lessons Learned report that the fact that they were forced to take onthe
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2017 ASEE Annual Conference & Exposition
Authors
Vetria L. Byrd Ph.D., Purdue University; Camilo Vieira, Purdue University, West Lafayette (College of Engineering)
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
and research objectives of theprogram. Fifteen students (out of 22, from the combined cohorts) participated in student postersessions at XSEDE.RECOMMENDATIONS The VisREU Site continued to improve and build on the success of the previous year.Student feedback helped to shape promising practices for future implementations. Promisingpractices from the 2014/2015 VisREU Site experience for research methods, studentpresentations, faculty presentations, and student mentoring are detailed below.Research Methods Students were required to complete the research and ethics training within the first weekof the program. The online training is part of the Collaborative Institutional Training Initiative(CITI) provided by the University of Miami
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2014 ASEE Annual Conference & Exposition
Authors
Reneta Davina Lansiquot, New York City College of Technology; Ashwin Satyanarayana, New York City College of Technology; Candido Cabo, New York City College of Technology/CUNY
Tagged Divisions
Computing & Information Technology
. The linking of the CS1 problem-solving course in an LC withEG1 further integrates narrative elements into computer problem-solving courses; thisintegration should result in improved and more transferable computer problem-solving skills.2.3 Introduction to Computer Systems (CS0)In this foundational course for Computer Systems, students engage in an overall inspection of theworld of computing. As part of this course, students also learn introductory concepts related to theinner workings of the computer, such as operating systems, networks, and database systems. Thisoverview of machine architecture, software development, data organization, ethics, computersecurity, and the theory of computing is presented to introduce students to the key threads