Asee peer logo
Displaying all 2 results
Conference Session
Information and Network Security
Collection
2015 ASEE Annual Conference & Exposition
Authors
Richard Scott Bell, Northwest Missouri State University; Eugene Vasserman, Kansas State University; Eleanor C Sayre, Kansas State University
Tagged Divisions
Computing & Information Technology
courses, we determined that we would not be able to simply adapt theapproaches used to develop these survey instruments into a new survey for cybersecurity. Instead,we would need to first identify how students relate to a course in cybersecurity. Therefore, wechose to first perform a qualitative study of students enrolled in an introductory cybersecuritycourse and then use those results to inform our development of the quantitative tool. 14Initial Qualitative StudyOver the course of a semester, we performed 3 rounds of semi-structured interviews with studentsenrolled in an introductory cybersecurity course designed for upper division undergraduate andfirst year graduate students. 7,27 Our goal was to discover those topics and experiences that
Conference Session
Embedded Systems and Mobile Computing
Collection
2013 ASEE Annual Conference & Exposition
Authors
Simin Hall, Virginia Tech; Clifford A. Shaffer, Virginia Tech; Eric Fouh, Virginia Tech; Mai Hassan ElShehaly, Virginia Tech; Daniel Breakiron, Virginia Tech
Tagged Divisions
Computing & Information Technology
system combining textbook-quality content with algo-rithm visualizations and interactive exercises. DSA courses emphasize dynamic processes suchas how various algorithms work. OpenDSA supports presenting such content in a highly visualmanner through the frequent use of slideshows, simulations, and visualizations. Students werealso provided a continuous stream of automated assessment questions and interactive exercises,thus providing immediate feedback to the students on their progress.A pilot study was conducted with students in a Computer Science course at Virginia Tech duringFall 2012. We tested three weeks of content on sorting and hashing in a quasi-experimental set-ting and collected quantitative and qualitative data. The data consisted of