Asee peer logo
Displaying results 31 - 41 of 41 in total
Conference Session
Tools and Techniques
Collection
2018 ASEE Annual Conference & Exposition
Authors
Karen H. Jin, University of New Hampshire; Michael Jonas, University of New Hampshire; Christopher David LeBlanc, University of New Hampshire; Theodore Sean Tavares, University of New Hampshire
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Paper ID #23065Modernizing Capstone Project: External and Internal ApproachesProf. Karen H. Jin, University of New Hampshire Karen H. Jin has been an Assistant Professor of Computer Science in Computing Technology program at UNH Manchester since Spring 2016. She previously taught as a lecturer for over ten years in University of Windsor and Dalhousie University. Her interest in computer science education research focuses on devel- oping new empirically supported theories and practices in teaching programming, software engineering and project-based learning with industrial relevance. She received her Ph.D. and M.Sc. in
Conference Session
Computing and Information Technology Division Technical Session 6
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Sami N. Rollins, University of San Francisco; Alark Joshi, University of San Francisco; Xornam Apedoe, University of San Francisco; Sophie Engle, University of San Francisco; Matthew Malensek; Gian Bruno, University of San Francisco
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Computer Science from the University of Nebraska at Omaha.Prof. Matthew MalensekMr. Gian Bruno, University of San Francisco American c Society for Engineering Education, 2021 Work in Progress: Understanding Professional Identity Development Among Computer Science StudentsIntroductionDespite growing enrollments in computing programs, retention, particularly of students fromhistorically marginalized and minoritized groups, remains a challenge [1]. Recent research hasdemonstrated that a stronger sense of disciplinary identity may contribute to increased persistencein STEM fields. A number of High-Impact Educational Practices (HIPs) [2] have been shown
Conference Session
Computing & Information Technology: Curriculum and Assessment
Collection
2018 ASEE Annual Conference & Exposition
Authors
Michael Oudshoorn, Northwest Missouri State University; Rajendra K. Raj, Rochester Institute of Technology; Stan Thomas, Wake Forest University; Allen Parrish, United States Naval Academy
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
process to ensure an appropriate high-quality program. • Support for professional development. • Modern and appropriate tools and equipment to support the program of study. • Appropriate institutional support to deliver the program of study. • Recruiting faculty who value accreditation because they themselves graduated from an ac- credited program. • A commitment to best practice. • Utilization of data to know how well the program is preparing students through attainment of the student outcomes. • Focus on “student outcomes” rather than “teaching points.” • Engaging stakeholders in the accreditation and continuous improvement processes.Employers hiring graduates of an accredited program see value in the following ways
Conference Session
Computing and Information Technology Division Technical Session 2
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Ida B. Ngambeki, Purdue University, West Lafayette; Marcus Rogers, Purdue University, West Lafayette; Sienna Jasmine Bates, Purdue University, West Lafayette; Megan Celeste Piper
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
] “Cybersecurity Curricula 2017 Curriculum Guidelines for Post-Secondary Degree Programs in Cybersecurity,” Dec. 2017.[12] “ABET Approves Accreditation Criteria for Undergraduate Cybersecurity Programs.” https://www.abet.org/abet-approves-accreditation-criteria-for-undergraduate-cybersecurity- programs/ (accessed Jan. 15, 2021).[13] D. H. Tobey, R. A. Gandhi, A. B. Watkins, and C. W. O’Brien, “Competency is Not a Three Letter Word A Glossary Supporting Competency-based Instructional Design in Cybersecurity,” Cybersecurity Skills Journal: Practice and Research, vol. 20, pp. 32–38, 2018, [Online]. Available: https://www.academia.edu/download/57509751/Tobey__Gandhi__Watkins___OBrien_2018_Co
Conference Session
Computing and Information Technology Division Technical Session 4
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Lina Battestilli, North Carolina State University; Sarah Korkes, North Carolina State University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
. She worked on the PowerEN Technology, a blur between general purpose and networking processors and hardware accelerators. She identified and studied workloads at the edge of the network that required high-throughput and fast deep-packet processing. Since 2012, her research has been focused on Computer Science Education, especially in the area of peer collaboration, scaling techniques for large courses, auto-graders and learning analytics. She is also working on software that can be used for teaching and learning. She is investigating techniques and best practices on broadening participation in Computer Science. Women and minorities need to be more involved in tech innovation as companies and teams perform
Conference Session
Computing Technology Applications-I
Collection
2018 ASEE Annual Conference & Exposition
Authors
Predrag T. Tosic, University of Idaho; Julie Beeston, University of Idaho
Tagged Divisions
Computing and Information Technology
: from graduate students overcoming true or perceiveddeficiencies in the CS foundations, to undergraduates transferring from local community colleges, many of whom stillstruggle with formulating a mathematical proof of any kind. This mix of students provides unique challenges, but alsoopportunities -- for example, to revisit teaching methodologies for the "mathematical side of computer science"curricula, how to best relate theory to practice (esp. in terms of technologies and applications these diverse studentscan most readily relate to), and how to best get students of broadly varying backgrounds actively engage in classdiscussions.Keywords:Teaching Undergraduate Computer Science, Theoretical Computer Science, Computer Science Curricula
Conference Session
Computing and Information Technology Division Poster Session
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Scott J. Reckinger, University of Illinois at Chicago; Shanon Marie Reckinger, University of Illinois at Chicago
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
(i.e. that student stress levels tend todecrease after completing the first coding interview and that students tend to find academic valuein the oral proficiency exam process) may help to alleviate anxiety and reduce gaps inbelongingness leading to a more productive and inclusive learning environment. The goal shouldbe to show students the positive impact the coding interview process can have on learning andthe invaluable potential impact the practice has on future job opportunities.ACKNOWLEDGMENTSWe would like to thank the graduate and undergraduate teaching assistants who helped run thecoding interviews. We would also like to thank the 748 students in CS 107 and CS 109 who gavetheir time and effort to their courses and this study. Lastly, we
Conference Session
Computing and Information Technology Division Poster Session
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
M Abdullah Canbaz, Indiana University Kokomo; KeeJoh OHearon; Michael McKee, Indiana University Kokomo; Md Nour Hossain
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
. Mohammadian, F. D. Mohammadian, and of things (IoT) research, 2006–2018,” Heliyon, D. Assante, “IoT-education policies on national vol. 5, no. 8, p. e02264, 2019. and international level regarding best practices in German SMEs,” in 2020 IEEE Global Engineering Education Conference (EDUCON), 2020, pp.[17] V. D. Soni, “Security issues in using iot enabled 1848–1857. devices and their Impact,” Int. Eng. J. Res. Dev., vol. 4, no. 2, p. 7, 2019.[18] P. Radanliev et al., “Definition of Internet of Things (IoT) Cyber Risk Discussion on a Transformation Roadmap for
Conference Session
Topics in Computing
Collection
2019 ASEE Annual Conference & Exposition
Authors
Naeem Seliya, Ohio Northern University; Heath Joseph LeBlanc, Ohio Northern University; J. Blake Hylton, Ohio Northern University; Ziad Youssfi, Ohio Northern University; Matthew Schweinefuss
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
- Business Security, Ch. 9, 2018. Taylor & Francis, CRC Group.[6] P. Kendeou, P. Broek, A. Helder, and J. Karlsson J, “A Cognitive View of Reading Comprehension: Implications for Reading Difficulties,” Learning Disabilities Research & Practice, 29(1), pp. 10–16, 2014.[7] L. McGarrity, “What Sentiment Analysis Can Do for Your Brand?” Marketing Profs, April 2016. Available online: https://www.marketingprofs.com/opinions/2016/29673/what- sentiment-analysis-can-do-for-your-brand.[8] A. E. Barth, S. Vaughn, P. Capin, E. Cho, S. Stillman-Spisak, L. Martinez, and H. Kincaid, “Effects of a Text-processing Comprehension Intervention on Struggling Middle School Readers,” Topics in Language Disorders, 36(4), pp. 368-389, 2016.[9] E. M
Conference Session
Computing and Information Technology Division Technical Session 8
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Stephanie J. Lunn, Florida International University; Monique S. Ross, Florida International University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
. Ross, Florida International University Monique Ross, Assistant Professor in the School of Computing and Information Sciences and STEM Transformation Institute at Florida International University, designs research focused on broadening par- ticipation in computer science through the exploration of: 1) race, gender, and disciplinary identity; 2) discipline-based education research (with a focus on computer science and computer engineering courses) in order to inform pedagogical practices that garner interest and retain women (specifically Black and His- panic women) in computer-related engineering fields. American c Society for Engineering Education, 2021
Conference Session
Computing and Information Technology Division Technical Session 1
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Elizabeth Milonas, New York City College of Technology; Duo Li, Shenyang City University; Qiping Zhang, Long Island University
Tagged Divisions
Computing and Information Technology
thinking, data modeling, communication, reproducibility and ethics [11]. In a similar study [13], researchers monitored trends across Europe in order to assess thedemands for particular Data Science skills and expertise. They [13] used automated tools for theextraction of Data Science job posts as well as interviews with Data Science practitioners. Thegoal of the study [13] was to find the best practices for designing Data Science curriculum whichinclude; industry aligned, use of industry standard tools, use of real data, transferable skill set,and concise learning goals. The best practices for delivery of Data Science Curriculum includemultimodality, multi-platform, reusable, cutting-edge quality, reflective and quantified, andhands-on. In