Asee peer logo
Displaying results 181 - 210 of 237 in total
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2016 ASEE Annual Conference & Exposition
Authors
James D. Palmer, Louisiana Tech University
Tagged Divisions
Computing & Information Technology
efforts of having students emailing spreadsheets with pre-defined templates (because ofthe live interactive nature of Google Sheets), the lack of anonymity of individuals and groupswas viewed as a significant drawback.The “Importrange” function built into Google Sheets allows defined information to be passedfrom one spreadsheet to another, allowing the sheet creator (in this case, the instructor) to specifythe workflow of information. Google Sheets also allows the “owner” to turn on and off sharingof worksheets (Figure 1). Using these two features, an instructor can create an individualworksheet for each student, where the information from each is consolidated into a singleinstructor worksheet that only that person can view (Figure 2 and 3
Conference Session
Emerging Computing and Information Technologies I
Collection
2016 ASEE Annual Conference & Exposition
Authors
Araceli Martinez Ortiz, Texas State University - San Marcos; Mina Guirguis, Texas State University
Tagged Divisions
Computing & Information Technology
. The aim of these models is to highlight the differencebetween Computer Science and Programming, to show the relevance of Computer Science inrecent advances in various fields, and to inspire students to appreciate Computer Science andthe role of algorithms in our daily lives. The modules will cover various topics about the role ofCS in cyber warfare, understanding biology, electronic voting, etc. In subsequent work, thesemodules will be launched as part of a mixed methods study to determine their effectiveness ascompared to a control group not learning through these models and the impact of those moduleson the retention rates of Computer Science majors.1. IntroductionThe President’s Council of Advisors on Science and Technology’s (PCAST
Conference Session
Topics in Computing and Information Technologies I
Collection
2015 ASEE Annual Conference & Exposition
Authors
Jeffrey Erin Cole, Acute Systems, LLC; Walter E Thain, Southern Polytechnic College of Engr and Engr Tech; Thomas Fallon, Southern Polytechnic College of Engr and Engr Tech
Tagged Divisions
Computing & Information Technology
finding lower-cost routers with the capability of running it can bechallenging. Cisco’s integrated services or multiservice routers are designed for branch officeapplications and some support IOS images with MPLS capability.Generally, MPLS first became available for certain 3600- and 2800- series branch routersstarting with IOS version 12.4(1). These routers are now obsolete though the 2800 is stillsupported into 2016. Presently Cisco’s branch router product line has moved to 3900-, and 2900-series. Determining an appropriate combination of platform and IOS feature set can be done bycontacting Cisco representatives or by using the online Cisco Feature Navigator8. The navigatorpermits searching by combinations of router platform, image release
Conference Session
Emerging Computing and Information Technologies II
Collection
2015 ASEE Annual Conference & Exposition
Authors
Arturo Camacho, University of Costa Rica
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
students do not need to study the underlying theory before class to understandthe algorithms. This methodology is aimed to explode the abilities of those with kinestheticlearning (others with a preference for other style of learning can make use of the videos,textbook, or the instructor’s lecture notes).3 It has the beneficial side effect of lettingstudents to socialize with their fellows by requiring them to get in touch and talk to eachother, and giving them the opportunity to learn their fellow’s names. It also avoids studentsto fall asleep in class, since they have to stand up and move to specific positions during thesimulations. Even though similar proposals exist in the literature,5, 6, 1, 4 some of them are nottailored to courses in data
Conference Session
Potpourri
Collection
2015 ASEE Annual Conference & Exposition
Authors
Joseph Alan Nygate, Rochester Institute of Technology (CAST); Richard Cliver, Rochester Institute of Technology (CAST)
Tagged Divisions
Computing & Information Technology
]. Typically, we wouldwe would just read the introduction, examine the diagrams and review the conclusion. The mainbody of text was only read if clarifications or in-depth information was needed. Not only did thissave time but also, as most of our employers were not native speakers of English, focusing oninfographics and less on text reduced misunderstandings [1].After moving to academia, I found that students were unaware of the writing style that is used intoday’s high-paced industries. While many schools offer writing intensive programs [3] andsome guidance on the use of graphs and charts [4], students do not receive enough instruction onhow to develop and integrate infographics [12] within their documentation. This is particularlytrue of the many
Conference Session
Emerging Computing and Information Technologies I
Collection
2016 ASEE Annual Conference & Exposition
Authors
Justin L. Hess, Purdue University, West Lafayette; Lorraine G. Kisselburgh, Purdue University; Carla B. Zoltowski, Purdue University, West Lafayette; Andrew O. Brightman, Purdue University, West Lafayette
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
perceptions overthree offerings. Specifically, throughout this study we investigated three research questions: 1. What are the differences in engineering students’ ethical reasoning changes when their mode of participation includes an in-class discussion-based lecture format compared to being completely restricted to online material delivery and interaction? 2. What are the differences in engineering students’ perceived effectiveness of an ethics course when participating in a hybrid versus a completely online format? 3. Are there any differences in the correlations between ethical reasoning changes and course perceptions between the hybrid and online groups?Study OverviewThis multiphase research study27 proceeded in three
Conference Session
Emerging Computing and Information Technologies I
Collection
2015 ASEE Annual Conference & Exposition
Authors
Steven Walter Tuttle, University of Technology Sydney; Bruce Moulton, University of Technology Sydney; David Lowe, The University of Sydney
Tagged Divisions
Computing & Information Technology
-item by line-item, and placed in a containingcategory. No additional containing categories were required during this follow on phase,indicating that categorical saturation was achieved. Four top level categories were added tothe 37 containers; effectively creating an hierarchical taxonomy for REILs.1 IntroductionThis paper presents a remote laboratory information taxonomy. Development of taxonomiesis a common human intellectual activity; a taxonomy within some given domain organizesand clarifies the domain content and provides a common framework that supports andfacilitates reasoning and communication about the domain in question. In this paper, theinformation taxonomy that is presented was developed to support reasoning about
Conference Session
Information and Network Security
Collection
2015 ASEE Annual Conference & Exposition
Authors
Richard Scott Bell, Northwest Missouri State University; Eugene Vasserman, Kansas State University; Eleanor C Sayre, Kansas State University
Tagged Divisions
Computing & Information Technology
Physics Department at Kansas State University. Page 26.496.1 c American Society for Engineering Education, 2015 Developing and Piloting a Quantitative Assessment Tool for Cybersecurity Courses Scott Bell1 , Eleanor Sayre2 , and Eugene Vasserman2 1 Northwest Missouri State University 2 Kansas State UniversityAbstractThe rapid growth of the Internet over the past two decades has led to a proliferation ofnetwork-capable computing devices
Conference Session
Potpourri
Collection
2016 ASEE Annual Conference & Exposition
Authors
Jinyi Zhang, Purdue University; Pan Fengjian, Purdue University, West Lafayette; Mrigank S. Jha, Purdue University, West Lafayette; Pranav Marla, Purdue University; Kee Wook Lee, Purdue University; David B Nelson, Purdue University, West Lafayette; Yung-Hsiang Lu, Purdue University
Tagged Divisions
Computing & Information Technology
  potential  limitations  of  the system, as well as suggestions for improvement.    Introduction  Technologies  are  foundations  of  modern  societies  and  software  plays  an  essential  role  in technologies.  Recognizing  the  importance  of  software,  computer  science has  become an integral part  of  general education in USA [1]. Developing high quality software is a complex process and many  tools  are  involved,  for  example,  version  control,  debugging,  performance  profile,  test coverage,  memory  access  violation,  and  resource  utilization.  As  an  analogy,  these  tools  are instruments  in  an  airplane; these instruments provide crucial information about the condition and status  of  the  plane. The speedometer informs a
Conference Session
Emerging Computing and Information Technologies I
Collection
2016 ASEE Annual Conference & Exposition
Authors
Afrin Naz, West Virginia University Inst. of Tech.
Tagged Divisions
Computing & Information Technology
graduation. These relate to the knowledge, skills, and behaviors that students acquire asthey progress through the program1. Criterion 3 of computing programs includes a set of ninegeneral outcomes that all computing baccalaureate graduates should possess. The nine generalstudent outcomes of computing programs along with two additional computer science outcomesare listed in Table 1. One aspect of the enhanced ABET criteria (2000) in engineering andtechnology is “an understanding of professional responsibility”. In “Embedding ABET’s studentoutcomes for professional skills” section we will walk through ABET’s four professional skillscommunication, teamwork, ethics and contemporary issues, and professional development(previously known as lifelong
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2016 ASEE Annual Conference & Exposition
Authors
Yung-Hsiang Lu, Purdue University; Thomas J. Hacker, Purdue University, West Lafayette; Carla B. Zoltowski, Purdue University, West Lafayette; Jan P. Allebach, Purdue University, West Lafayette
Tagged Divisions
Computing & Information Technology
skills are essential for career development. However, in typicaluniversity settings, undergraduate students take different courses and work on different projects indifferent teams each semester. As a result, students lack opportunities to work on multi-yearprojects and develop the skills essential for long-term planning. To remedy this situation, ourdepartment has created elective courses that allow students from all years (first-year students tograduate students) to work on research projects under the supervision of faculty members and thementorship of senior graduate students. These projects provide the opportunities for students tolearn many skills essential in workplace, such as (1) understanding how projects are designed andmanaged; (2
Conference Session
Communication Across the Divisions III: Writing as Social–Technical Integration
Collection
2015 ASEE Annual Conference & Exposition
Authors
Natascha M. Trellinger, Purdue University, West Lafayette; Rebecca R. Essig, Purdue University, West Lafayette; Cary D. Troy, Purdue University, West Lafayette; Brent K. Jesiek, Purdue University, West Lafayette; Josh Boyd, Purdue University, West Lafayette
Tagged Divisions
Computing & Information Technology, Liberal Education/Engineering & Society
, fluid mechanics, homework problems, content analysis,textbooks, writing promptsIntroductionAs assessments of learning outcomes are increasingly emphasized through accreditationrequirements (e.g., via ABET) and other quality assurance initiatives, written communication isone area that engineering instructors often find challenging to incorporate and assess.1 This isparticularly true in large core courses at the sophomore and junior levels. Yet it has also beenfound that technical writing is best taught during the learning of technical material.2This study is part of a larger ongoing project to understand and expand the incorporation ofwriting in large-lecture engineering courses, including investigation of faculty perspectives andtextbook
Conference Session
Potpourri
Collection
2015 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Ali Sanati-Mehrizy; Paymon Sanati-Mehrizy; Reza Sanati-Mehrizy, Utah Valley University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
lives, theopportunities for careers are expanding rapidly. A major challenge of this field is the trainingand education of a new generation of skilled workers. This paper studies different approachesthat are used by different institutions of higher education to integrate nanotechnology conceptsinto their curriculum.IntroductionNanotechnology is the science, engineering, and technology that deals with various structures ofmatter that have dimensions on the order of a billionth of a meter. Nanotechnology is the abilityto observe, manipulate, measure, and manufacture things at the nanoscale, which is about 1 to100 nanometers. While the word nanotechnology is new and was introduced in the late 1970s,the existence of functional devices and
Conference Session
Emerging Computing and Information Technologies I
Collection
2016 ASEE Annual Conference & Exposition
Authors
Chafic Bousaba, Guilford College; Tiera Kazar, Guilford College; Will C. Pizio, Guilford College
Tagged Divisions
Computing & Information Technology
from the robust FruityWifi package. Wireshark filters, captures, andanalyzes network packets, such as hypertext transfer protocol secure (HTTPS) requests. SSLstripstrips the secure connection and convert HTTPS to hypertext transfer protocol (HTTP), gainingaccess to sensitive information such as login credentials. This simple to implement yet powerfulproject, demonstrates the ease of hiding and discreetly deploying a Raspberry Pi on a vulnerablewireless network to sniff network packets that is considered protected behind firewalls, whilemaintaining a safe distance and anonymity from the target.IntroductionThe Raspberry Pi, see figure 1, is a miniature and affordable computer created by the RaspberryPi Foundation, an educational charity based in
Conference Session
Information and Network Security
Collection
2016 ASEE Annual Conference & Exposition
Authors
Te-shun Chou, East Carolina University; Steve Keith Baker, East Carolina University; Miguel Vega-Herrera
Tagged Divisions
Computing & Information Technology
images on a computer. Both provide good Graphic UserInterface (GUI) design and have been intensively used for learners to build, configure, andtroubleshoot networks in a virtualized network environment. In this paper, PT and GNS3 will becompared from the perspectives of capability and complexity. Strengths and weaknesses of eachwill be discussed. In addition, networks will be built in order to illustrate the points of ourdiscussion.1. IntroductionAs technological advances continue to further integrate different aspects of our lives, it becomesincreasingly difficult to not depend on technology on a day to day basis. All of the smart devices,gadgets and gizmos converge at a central point that provides connectivity between them - thenetwork. With
Conference Session
Emerging Computing and Information Technologies II
Collection
2015 ASEE Annual Conference & Exposition
Authors
Edward F. Gehringer, North Carolina State University
Tagged Divisions
Computing & Information Technology
need for automated and scalableassessment mechanisms, to assess large numbers of students without a proportionateincrease in costs. There are four main approaches to this kind of assessment:autograding, constructed-response analysis, automated essay scoring, and peer review.This paper examines the current status of these approaches, and surveys new research oncombinations of these approaches to produce more reliable grading.Keywords: scalable assessment, autograding, constructed-response analysis, automatedessay scoring, peer review, self-review1. IntroductionLimited resources to adequately assess student work are a major problem in highereducation. A 2012 New York Times article [1] on automated essay scoring contains thefollowing anecdote
Conference Session
Topics in Computing and Information Technologies I
Collection
2015 ASEE Annual Conference & Exposition
Authors
Mudasser Fraz Wyne, National University; Jodi Reeves, National University; Frank Xavier Montes; Tom J Gurbach
Tagged Divisions
Computing & Information Technology
college upper level management to quickly evaluate theuniversity’s performance by looking at the index score. The upper management can thendrill down and see which KPI’s were responsible for the change in monthly performance.Richland used these metrics until 2007, but the structure of their dashboard had evolved,adding visual cues in the form of traffic lights to allow for faster analysis10. Table 1. Richland College Data Dashboard9 Page 26.312.5In the year 2000, The University of California (UC) realized that it would need to makechanges to its business architecture to accommodate its projected influx of futureenrollments. Since the
Conference Session
Emerging Computing and Information Technologies II
Collection
2016 ASEE Annual Conference & Exposition
Authors
Tae-Hoon Kim, Purdue University - Calumet; Keyuan Jiang, Purdue University - Calumet; Vivek Singh Rajput
Tagged Divisions
Computing & Information Technology
host and across different hostsusing container-based virtualization technology. Afterward, we will evaluate and compare theperformance of such implementation with a cluster built on physical machine.1 IntroductionThe practical exercises included in laboratory-based course play an important role in engineeringand science educations. Many academic institutes developed the laboratory-based courses to helpstudents to accelerate their learning in different types of laboratories such as real, simulation, oronline [1]. Especially in Information Technology education, hands-on exercises through thelaboratory became an essential component of the course because it provides students with anopportunity to learn and observe how to apply the concepts
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2015 ASEE Annual Conference & Exposition
Authors
John Pickard, East Carolina University; Annie Y. Patrick, East Carolina University; Dustin Stocks
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
the level of IPv6 readiness ofinternational universities is largely unknown. Secondly, the quality or “effectiveness” ofuniversities that have IPv6 web services enabled is also unknown. This study addresses thesetwo challenges by providing the first known published assessment of the IPv6 enablement ofuniversities within a global scope.Though the need to become ready for IPv6 implementation may not be on the forefront of auniversity’s list of priorities, the effects of not becoming IPv6 ready can have negativeimplementations much sooner than administrators may anticipate. A university’s adoption ofIPv6 can affect the institution’s teaching, research, innovation, and budget.1 Partneringinstitutions and research facilities that are already IPv6
Conference Session
Topics in Computing and Information Technologies II
Collection
2015 ASEE Annual Conference & Exposition
Authors
Michael Tamir; Ronald S Harichandran P.E., University of New Haven; Lueny Morell, InnovaHiEd
Tagged Divisions
Computing & Information Technology
programs fail to engage 21st century learners, ignoring the plethora of resourcesand techniques made available by advanced technology.1 GalvanizeU offers programs that are industry relevant. Developed in partnership with theUniversity of New Haven (UNH), GalvanizeU’s data science program is based in Silicon Valley,California (San Francisco). GalvanizeU/UNH will infuse a new breed of diverse, creative andinterdisciplinary talent into the field of data science. This paper describes the innovative way in which GalvanizeU/UNH’s curriculum isdesigned to address the needs of students, educators, employers, and stakeholders, combininglearner-centered pedagogy, industry partnerships, and a commitment to continuous improvement.The first program
Conference Session
Potpourri
Collection
2016 ASEE Annual Conference & Exposition
Authors
Roxanne Moore, Georgia Institute of Technology; Douglas Edwards, Georgia Institute of Technology; Jason Freeman, Georgia Institute of Technology; Brian Magerko, Georgia Institute of Technology; Tom McKlin, SageFox Consulting Group; Anna Xambo, Georgia Institute of Technology
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
, experiment, evaluate, iterate, and innovate [1].Computer science education research has generally focused on engagement [2], [3] compellingdomains for learning computing [4]–[9], and specific pedagogical strategies[10], [11]. However,as a nation we have yet to make major strides in developing computing literacy as a core 21stcentury STEM skill for tackling multidisciplinary problems [12]. Computing is seen as uncooland approaches to teaching it may be uninspiring [13]. Yet demand for computer scientists in thejob market remains robust: over 1.4 million computing-related jobs are estimated to be availablenationally in 2018, with US universities only meeting a third of that demand in degreeproduction [12].Music, a ubiquitous part of human culture with
Conference Session
Emerging Computing and Information Technologies II
Collection
2016 ASEE Annual Conference & Exposition
Authors
Yujian Fu P.E., Alabama A&M University; Peter J. Clarke, Florida International University; Nelson Barnes Jr, Alabama A&M University
Tagged Divisions
Computing & Information Technology
. c American Society for Engineering Education, 2016 Integrating Software Testing into Computer Science Curriculum Using WReSTT-CyLE and Learning Objects Yujian Fu1, Nelson Barnes1, and Peter Clarke2 1 Alabama A&M University 4900 Meridian Street Normal AL 35762 2 Florida International University 11200 SW 8th Street Miami, FL 33199 Telephone: (305) 348-2440Abstract
Conference Session
Topics in Computing and Information Technologies II
Collection
2015 ASEE Annual Conference & Exposition
Authors
John Glossner, Daniel Webster College; Nicholas Bertozzi, Daniel Webster College; Charles N Stevenson P.E., Daniel Webster College
Tagged Divisions
Computing & Information Technology
two semesters. Figure 1. Cynefin Complex Domain (used with permission Cognitive Edge Pte Ltd http://cognitive-edge.com/ as published in Essential Scrum: A Practical Guide to the Most Popular Agile Process1) Page 26.809.2Many projects can be partitioned into domains according to their complexity and uniqueness.The Cynefin framework partitions projects into five domains based on their complexity: Simple,Complicated, Complex, Chaotic, and Disorder. In the Simple domain the correct solution isobvious and generally undisputed. Best practices and continuous business process improvementmethodologies
Conference Session
Potpourri
Collection
2015 ASEE Annual Conference & Exposition
Authors
Reza Sanati-Mehrizy, Utah Valley University; Ali Sanati-Mehrizy; Paymon Sanati-Mehrizy, Icahn School of Medicine at Mount Sinai; Afsaneh Minaie, Utah Valley University
Tagged Divisions
Computing & Information Technology
Data Mining for Adverse Event Detection and Action RecommendationAbstractMany real-life data mining applications use sequence data modeling, in which data isrepresented as a sequence. A temporal sequence is a finite ordered list of events (t1,e1),(t2,e2), …,(tn,en) where ti represents time and ei represents the event taking place at time ti.ei takes place before ei+1 for 1≤ i ≤ n-1. This model can be used in data mining, calledsequence data mining, to predict certain event that may take place at a specific time.Sequence data mining has a wide range of applications. This data mining technique canbe used for prediction of adverse events and can recommend appropriate actions to betaken as needed. In aviation safety, the
Conference Session
Emerging Computing and Information Technologies I
Collection
2015 ASEE Annual Conference & Exposition
Authors
Smitesh Bakrania, Rowan University; Brad Joseph Johnson, Rowan University
Tagged Divisions
Computing & Information Technology
engineering discipline and 2more projects for out-of-discipline choices. At the same time, each faculty member shares theirlist of projects, each specifying the maximum number of students required from each discipline.Once all the input is collected, discipline managers (DM’s) from each of the engineeringdepartments manually sorted students according to the preferences and project constraints.Figure 1 attempts to visually capture the existing assignment approach.Figure 1. The existing approach involved faculty pitches where faculty members described their project’s needs (left) and students submitted their preferences via paper-based formed (right
Conference Session
Information and Network Security
Collection
2016 ASEE Annual Conference & Exposition
Authors
John Pickard, East Carolina University; John B. Southworth, East Carolina University
Tagged Divisions
Computing & Information Technology
theperspective of the Internet, focusing on quantitative analysis of metrics measuring levels ofdeployment, traffic, and performance3,10-13.Our study extends that of Czyz et al. who employed a broad approach to measuring IPv6deployment, assembling a breadth of observations and comparing datasets against each other.Their findings provided a better understanding of the systemic state of IPv6 deployment throughthe use of multiple measured metrics and datasets, each focused on one or more aspects of IPv6adoption3.MethodologySince our goal was to extend the research of Czyz et al. we focus on using the same or similarmetrics and methods as closely as possible. Specific details on each metric is discussed in thesections that follow for each metric. Table 1
Conference Session
Emerging Computing and Information Technologies II
Collection
2016 ASEE Annual Conference & Exposition
Authors
Mahmoud K. Quweider, University of Texas - Rio Grande Valley; Fitratullah Khan, University of Texas - Rio Grande Valley
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
understanding."The approach is even more challenging to implement in the SMT (Science, Mathematics, andTechnology) fields at minority-serving institutions requiring trained faculty.This paper describes in detail our efforts to implement CBI in the Computer Science curriculumin general, and Computer Graphics (CG) and Software Engineering (SWE) in particular. Theeffort is part of an NSF grant awarded to UT Pan Am and UT Brownsville (both are now part ofthe newly merged university of UT Rio Grande Valley). The CG and SWE courses were selectedbecause of the initial high enrollment but the low retention rate. The paper documents the effortsthat have been made in specific areas of the newly implemented courses. These include: 1. The process of identifying
Conference Session
Potpourri
Collection
2015 ASEE Annual Conference & Exposition
Authors
Chaomin Luo, University of Detroit Mercy
Tagged Divisions
Computing & Information Technology
-based course, multiple-projectis intended to be designed to train the following research skills of students: (1) knowing currentwork in field, (2) recognizing research problems, (3) critical thinking, (4) problem-resolving, (5)research methods, (6) critical reviewing, and (7) documenting and reporting.2. The On-going Multiple-project-based PedagogyThe Department of Electrical and Computer Engineering in our school offers track concentration onthe Robotics and Mechatronics program. A variety of practical research and development projectsare crucial features of the Robotics and Mechatronics program. Therefore, ComputationalIntelligence course with on-going practical R&D project is a great opportunity for students toenhance their research
Conference Session
Emerging Computing and Information Technologies II
Collection
2016 ASEE Annual Conference & Exposition
Authors
Samuel Moses, Brigham Young University; Nathaniel Scott Baker; Dale C. Rowe, Brigham Young University
Tagged Divisions
Computing & Information Technology
student may be appropriate. All students wishingto take this course must also submit an Ethics Agreement to reinforce the ethics expected of acybersecurity professional. An example of a cybersecurity course Ethics Agreement can befound in Appendix A.Learning OutcomesThe Social Engineering course learning outcomes include the following: 1. Explain the various techniques that can be used to complete Social Engineering exploits. 2. Develop an understanding of the psychology of human interaction and how it can be exploited for gain. 3. Learn what technical controls, trainings, and processes can be used to help defend and establish security in-depth to protect against Social Engineering. 4. Overcome uncomfortable feelings such as
Conference Session
Information and Network Security
Collection
2016 ASEE Annual Conference & Exposition
Authors
Sarah A. Cunha; Dale C. Rowe, Brigham Young University
Tagged Divisions
Computing & Information Technology
-year-old became one of the first uncontained computerviruses 1 to be found in the wild. Some were created as proof of concept, showing whattheoretically can be done by outside software. The use of viruses gradually developed to read,destroy, or even steal data. These functions have become a key part of cyber-crime, and arecontinually on the rise today. The malicious intent of these programs gave rise to the termmalicious software, otherwise known as malware.According to Verizon’s 2014 Data Breach Investigations Report, 63,437 security incidents werereported in the year 2013, and 1,367 of those incidents resulted in a confirmed data breach 2. The2014 US State of Cybercrime Survey claims that an average of 135 security incidents perorganization