Asee peer logo
Displaying all 4 results
Conference Session
Emerging Information Technologies
Collection
2011 ASEE Annual Conference & Exposition
Authors
Don Chen, University of North Carolina, Charlotte; Bruce Gehrig, University of North Carolina, Charlotte
Tagged Divisions
Computing & Information Technology
. The knowledge and skills associated with project administration include: a. understanding project delivery processes; b. applying principles of construction law and ethics; c. understanding contractor licensing requirements and procedures; d. understanding lien and labor laws as applied to construction; e. identifying appropriate construction codes and regulations; f. developing quality control programs and plans; Page 22.818.6 g. performing economic analyses and developing cash flow projections; and h. managing risks on a construction project.IV. The knowledge and skills associated with contract documents
Conference Session
Emerging Information Technologies
Collection
2011 ASEE Annual Conference & Exposition
Authors
Abul K. M. Azad, Northern Illinois University
Tagged Divisions
Computing & Information Technology
thedeveloped facility as well as evaluate the student learning outcomes. To address these issuesthe evaluation process is divided into four parts: a) assess students’ learning outcomes; b)assess students’ learning behavior in terms of the access time and duration of use (in terms ofthe use of the facility); c) assess the effectiveness of the facility and students’ perceptionabout the facility; and d) assess ethical issues. The first two are achieved through quantitativeanalysis, while the last one is done through qualitative analysis. Professor Herbert J.Walberg, Research Professor of Education and Psychology at the University of Illinois atChicago and Visiting Professor at Stanford University, acted as the external evaluator. He isa world renowned
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2011 ASEE Annual Conference & Exposition
Authors
Joseph Idziorek, Iowa State University; Mark F. Tannian, Iowa State University; Douglas W. Jacobson, Iowa State University
Tagged Divisions
Computing & Information Technology
avoid. An appreciation of the offensive mindset helps the student develop the wisdomnecessary to be an effective last line of defense after their investments in mitigation like anti-virus software, firewalls and patching fails. Understanding that they are the target the attacker istrying to exploit improves their chances of thwarting social engineering attacks (e.g. phishing,spear phishing, Trojan horse, drive-by downloads, scareware, ransomware) that have been highlysuccessful. As responsible educators, we ensure ethics discussions encapsulate the presentation Page 22.1379.7of offensive methods in order to avoid encouraging malicious cyber
Conference Session
Emerging Information Technologies
Collection
2011 ASEE Annual Conference & Exposition
Authors
Barbara E. Brazon, Penn State University; Mary Lynn Brannon, Pennsylvania State University, University Park
Tagged Divisions
Computing & Information Technology
statedthat they rarely thought about the perceptions of group members to their work ethic, attitudes andcompetency prior to this course. A few of the students noted that after the first couple of reviewsby their peers they became more actively engaged as a direct result of evaluations providedthroughout the project. See Appendix B for the Student Performance Evaluation Form.Prior to being evaluated by the manger the students were required to perform a self-evaluationusing the Student Performance Evaluation Form, which is then reviewed with the manager forhis/her input. Students were evaluated a minimum of four times during the course of the project.Students also noted in their Lessons Learned report that the fact that they were forced to take onthe