- Conference Session
- Emerging Information Technologies
- Collection
- 2011 ASEE Annual Conference & Exposition
- Authors
-
Don Chen, University of North Carolina, Charlotte; Bruce Gehrig, University of North Carolina, Charlotte
- Tagged Divisions
-
Computing & Information Technology
. The knowledge and skills associated with project administration include: a. understanding project delivery processes; b. applying principles of construction law and ethics; c. understanding contractor licensing requirements and procedures; d. understanding lien and labor laws as applied to construction; e. identifying appropriate construction codes and regulations; f. developing quality control programs and plans; Page 22.818.6 g. performing economic analyses and developing cash flow projections; and h. managing risks on a construction project.IV. The knowledge and skills associated with contract documents
- Conference Session
- Emerging Information Technologies
- Collection
- 2011 ASEE Annual Conference & Exposition
- Authors
-
Abul K. M. Azad, Northern Illinois University
- Tagged Divisions
-
Computing & Information Technology
thedeveloped facility as well as evaluate the student learning outcomes. To address these issuesthe evaluation process is divided into four parts: a) assess students’ learning outcomes; b)assess students’ learning behavior in terms of the access time and duration of use (in terms ofthe use of the facility); c) assess the effectiveness of the facility and students’ perceptionabout the facility; and d) assess ethical issues. The first two are achieved through quantitativeanalysis, while the last one is done through qualitative analysis. Professor Herbert J.Walberg, Research Professor of Education and Psychology at the University of Illinois atChicago and Visiting Professor at Stanford University, acted as the external evaluator. He isa world renowned
- Conference Session
- Curricular Issues in Computer-Oriented Programs
- Collection
- 2011 ASEE Annual Conference & Exposition
- Authors
-
Joseph Idziorek, Iowa State University; Mark F. Tannian, Iowa State University; Douglas W. Jacobson, Iowa State University
- Tagged Divisions
-
Computing & Information Technology
avoid. An appreciation of the offensive mindset helps the student develop the wisdomnecessary to be an effective last line of defense after their investments in mitigation like anti-virus software, firewalls and patching fails. Understanding that they are the target the attacker istrying to exploit improves their chances of thwarting social engineering attacks (e.g. phishing,spear phishing, Trojan horse, drive-by downloads, scareware, ransomware) that have been highlysuccessful. As responsible educators, we ensure ethics discussions encapsulate the presentation Page 22.1379.7of offensive methods in order to avoid encouraging malicious cyber
- Conference Session
- Emerging Information Technologies
- Collection
- 2011 ASEE Annual Conference & Exposition
- Authors
-
Barbara E. Brazon, Penn State University; Mary Lynn Brannon, Pennsylvania State University, University Park
- Tagged Divisions
-
Computing & Information Technology
statedthat they rarely thought about the perceptions of group members to their work ethic, attitudes andcompetency prior to this course. A few of the students noted that after the first couple of reviewsby their peers they became more actively engaged as a direct result of evaluations providedthroughout the project. See Appendix B for the Student Performance Evaluation Form.Prior to being evaluated by the manger the students were required to perform a self-evaluationusing the Student Performance Evaluation Form, which is then reviewed with the manager forhis/her input. Students were evaluated a minimum of four times during the course of the project.Students also noted in their Lessons Learned report that the fact that they were forced to take onthe