Paper ID #16620The Development of Ethical Reasoning: A Comparison of Online versus Hy-brid Delivery Modes of Ethics InstructionDr. Justin L. Hess, Purdue University, West Lafayette Justin L. Hess received his PhD from Purdue University’s School of Engineering Education along with his Master’s of Science and Bachelor of Science from Purdue’s School of Civil Engineering. Justin is currently a Postdoctoral Researcher in the STEM Education Research Institute at IUPUI. Justin’s research interests include developing pedagogical strategies to improve STEM students’ ethical reasoning skills; exploring the role of empathy within
Paper ID #16625Ethical Issues in Computing: Student Perceptions SurveyDr. Ali Salehnia, South Dakota State University Professor of Computer Science, South Dakota State University. Computer Science Faculty since 1982. Published more than 40 peer reviewed papers. Supervised more than 30 Master’s Degree thesis and research/design papers. Served on more than 60 Master’s and Ph.D. students’ graduate committees.Shieva Salehnia c American Society for Engineering Education, 2016 Ethical Issues in Computing: Students’ Perceptions Survey Ali Salehnia
Society for Engineering Education, 2016 Embedding ABET’s outcomes in a software engineering courseIntroduction The Accreditation Board for Engineering and Technology (ABET) is the leader in assuringquality and stimulating innovation in applied science, computing, engineering, and engineeringtechnology education. One aspect of the enhanced ABET criteria (published in 2000) is “anunderstanding of professional responsibility.” In ABET student learning outcomes forcomputing, Outcomes d to h (i.e., communication, teamwork, impacts of computing, ethics andprofessional development) are identified as “professional skills.” In most undergraduate computing and engineering programs, students do not haveopportunities to be exposed to the
student may be appropriate. All students wishingto take this course must also submit an Ethics Agreement to reinforce the ethics expected of acybersecurity professional. An example of a cybersecurity course Ethics Agreement can befound in Appendix A.Learning OutcomesThe Social Engineering course learning outcomes include the following: 1. Explain the various techniques that can be used to complete Social Engineering exploits. 2. Develop an understanding of the psychology of human interaction and how it can be exploited for gain. 3. Learn what technical controls, trainings, and processes can be used to help defend and establish security in-depth to protect against Social Engineering. 4. Overcome uncomfortable feelings such as
over to view these competitions and discuss onvarious ethical issues on privacy and security and give their valuable advises to the youngcompetitors. CTF competitions are conducted at college as well as high school level. CTFs are ofdifferent types. The most common types of CTFs are:Jeopardy: In this type of contest, teams have to solve a set of challenges from diverse areas suchas Cryptography, Forensics Reverse engineering etc.Attack-Defense: As the name suggests, this is an attack, Defense game meaning some teams tryto attack and the other teams try to defend from attacks.Mixed Competitions: Change formats.CTF competitions train the participants to protect their systems from cyber attacks. Thechallenges are mainly on fixing vulnerabilities
not be true. We have added some catalyst strategies during class study, the observation is very interesting. Third, collaboration and ethics. WReSTT-CyLE is an environment that emphasizes the collaborative learning strategy through a team based approach. At the same time, as an online learning environment, out of class study would be suitable for students and is one of the main purposes of this project. Does the organic collaboration bring efficient results and learning outcomes? Does gamification emphasize independent and team wide learning? Is each team learning on an independent based XP? If some of the answers to the above questions are no, how do we adjust the bias in the results?After the study, we retrieved the data and
the EPICS Program at Purdue University. She received her B.S. and M.S. in electrical engineering and Ph.D. in engineering education, all from Purdue University. She has served as a lecturer in Purdue’s School of Electrical and Computer Engineering. Dr. Zoltowski’s academic and research interests broadly include the professional formation of engineers and diversity and inclusion in engineering, with specific interests in human-centered design, engineering ethics, leadership, service-learning, assistive-technology, and accessibility.Prof. Jan P. Allebach, Purdue University, West Lafayette Jan P. Allebach is Hewlett-Packard Distinguished Professor of Electrical and Computer Engineering at Purdue University. Allebach
, Planning Required existing systems, and organization. 4. Designing appropriate solutions that satisfy and integrate Planning, Metrics Required ethical, social, legal, and economic concerns. 5. Learning to apply theories, models, and techniques to Planning, Metrics Required identify problems, implement solutions and verify results. 6. Understanding the importance of negotiation, effective Topics Adequately Cover work habits, leadership, and good communication. 7. Learning emerging models, techniques, and technologies as they emerge and the
courses in Com- puter Science, Information Systems, and Data Analytics. He has a special interest in ethical conducts in multicultural settings. c American Society for Engineering Education, 2016 Journey to Accreditation: Assessment Made Easy Alireza Farahani Mudasser F. Wyne Lu Zhang School of Engineering and Computing National University San Diego, CA, USAAbstractAssessment is a scientific measure for assessing learning abilities of students. It measuresstudents understanding of concepts and/or procedures by having to show what studentshave learned. Data
Collaboration of Working Groups in Global Airline Operations: Leveraging Smartphone Push-To-Talk Functionalities. in 10th Annual IEEE IT Professional Conference, The College of New Jersey. 2015. Computer Society Chapter of Princeton and the Princeton Chapter of the ACM (Association for Computing Machinery): IEEE (Institute of Electrical and Electronics Engineers)39. Cohn, A., et al., Analysis of the Potential for Delay Propagation in Passenger Airline Networks. 2007.40. Fernando, A.C., Business ethics and corporate governance. 2010: Pearson Education India.41. Gomes Da Costa, A.C., Por uma pedagogia da presenca [For a pedagogy of presence]. Brasilia: Fundacao Centro Brasileiro para a Infacia e Adolescéncia (FCBIA
software testing techniques. This preparationshould increase the students’ chances of success in both creating testable requirements for theirapplications as well as creating adequate test cases.CS/CMP 403 – Senior Problem This is capstone course of Computer Science at AAMU and a continuation of CS/CMP401 (software engineering). During this course, the student is expected to code a single,meaningful project started earlier in CS/CMP 401 and present the results of this project in class.This project must meet a set of standards for software design and documentation. Topics ofprofessional ethics and responsibilities are discussed in the class. Software-testing techniquesmust be used in this course on the selected project to ensure the quality