- Conference Session
- IT-based Instructional Technologies
- Collection
- 2012 ASEE Annual Conference & Exposition
- Authors
-
Alireza Kavianpour, DeVry University, Pomona; David Layton, DeVry University, Pomona
- Tagged Divisions
-
Computing & Information Technology
, where he teaches general literature, science fiction, composition (both beginning and advanced), ethics, and public speak- ing. He has a Ph.D. in English from the University of California, Santa Barbara (1994). His dissertation was about the portrayal of science in postmodernist fiction. He has published scholarly articles on science fiction, literature, television, film, and music. His most recent work includes a paper presented at two conferences about the design of university-level science fiction courses, using science fiction to teach the ethics of technology. He also gave a talk on Doctor Who and the critique of capitalism. At the end of 2011, his book on the humanism of Doctor Who will be published
- Conference Session
- Information and Network Security
- Collection
- 2012 ASEE Annual Conference & Exposition
- Authors
-
Frank Jordan Sheen, Brigham Young University; Dale C. Rowe Ph.D., Brigham Young University; Richard G. Helps, Brigham Young University
- Tagged Divisions
-
Computing & Information Technology
IPSec Figure 2 - Example of Man-In-The-Middle SCADA Attack LabSCADA security modules such as these should be performed with the ethical intent tounderstand and prepare against attacks on SCADA systems. Modules such as these may solidifyunderstanding of SCADA systems, and provide ways to interest students in performingundertaking further research. Page 25.877.5Conclusion and Future ResearchAs security of large scale embedded systems becomes more of a focus in academia, there will bea new challenge in how to educate students on these kinds of environments. The history of thiseducation has been spread across disciplines