Asee peer logo
Displaying results 61 - 66 of 66 in total
Conference Session
Curriculum and Assessment I
Collection
2019 ASEE Annual Conference & Exposition
Authors
Reza Sanati-Mehrizy, Utah Valley University; Kailee Parkinson, Utah Valley University; Elham Vaziripour, Utah Valley University; Afsaneh Minaie, Utah Valley University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
gives students acomprehensive understanding of Data Mining principles based on major concepts covered inacademia and required by job market. The concepts included in the course are intended toprepare students for careers that involve applying Data Mining skills.We do not have adequate evidence and feedback from the students who have taken the course toverify that the provided strategies are the best overall approach. Future study may include astatistical analysis of how effective our proposed curriculum is in accomplishing our goals ofpreparing students with Data Mining skills, catering to undergraduate level students, andpresenting concepts relevant to Data Mining. This would solidify our proposed curriculum’seffectiveness and provide valuable
Conference Session
Curriculum and Assessment III
Collection
2019 ASEE Annual Conference & Exposition
Authors
Rosa Maria Castro Fernandes Vasconcelos, University of Minho; Victor F. A. Barros, University of Minho; Luis Alfredo Martins Amaral P.E., University of Minho; Emilia Rodrigues Araújo, University of Minho; Isabel Ramos, University of Minho
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
: "Project UID/CTM/00264/2019 of 2C2T – Centro de Ciência e Tecnologia Têxtil,;“Project UID/CEC/00319/2019” and COMPETE: POCI-01-0145-FEDER-007560; projectUID/CCI/00736/2013.References[1] Bradley, K. (2000). The incorporation of women into higher education: Paradoxical outcomes?Sociology of education, 73, 1-18.[2] Brooks, G. R. (2001). Masculinity and men's mental health. Journal of American CollegeHealth, 49(6), 285-297.[3] Fox, M. F., & Stephan, P. E. (2001). Careers of young scientists: Preferences, prospects andrealities by gender and field. Social studies of Science, 31(1), 109-122.[4] Lawless, J. L., & Fox, R. L. (2005). It takes a candidate: Why women don't run for office.Cambridge University Press.[5] Stewart, A. J., Malley, J. E
Conference Session
Computing and Information Technology Division Poster Session
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Scott J. Reckinger, University of Illinois at Chicago; Shanon Marie Reckinger, University of Illinois at Chicago
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
next semester than peers. In another study [11],African American students who received the social-belonging intervention earned higher gradesthroughout the following 3-year period, halving the racial achievement gap. The interventionalso increased the percentage of African American students in the top 25% of the class. Inanother study [12], the social-belonging intervention increased the percentage of students whostayed full-time enrolled in college in their first year from 32% to 43% and increased thepercentage of ethnic-minority and first-generation college students who completed the first yearfull-time enrolled by 4%. In a recent study [13], the long-term effects of the intervention showedgreater career satisfaction and success in black
Conference Session
Computing and Information Technology Division Technical Session 2
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Jeremy Straub, North Dakota State University
Tagged Divisions
Computing and Information Technology
. D. Rhoads, “Traditional, Online or Both? A Comparative Study of University Student Learning and Satisfaction Between Traditional and Hyflex Delivery Modalities,” Concordia University, Irvine, CA, 2020.[29] M. Koskinen, “Understanding the Needs of Adult Graduate Students: An Exploratory Case Study of a HyFlex Learning Environment,” Northeastern University, 2018.[30] D. Wright, “The HyFlex course design: A case study on adult and career education courses,” Natl. Soc. Sci. J., vol. 48, no. 2, pp. 88–93, 2016.[31] P. Marella, J. Straub, and B. Bernard, “Development of a facial feature based image steganography technology,” in Proceedings of the 6th Annual Conference on Computational Science and
Conference Session
Computing and Information Technology Division Technical Session 1
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Elizabeth Milonas, New York City College of Technology; Duo Li, Shenyang City University; Qiping Zhang, Long Island University
Tagged Divisions
Computing and Information Technology
the Data Sciencecurriculum, mathematical foundations, computational and statistical thinking [11], [12]. Theworkshop participants felt this combination would provide a rich and effective series of coursesand would well prepare graduates for careers in Data Science [11]. The workshop resulted inidentifying key skills required for undergraduate Data Science majors to master includingcomputational and statistical thinking, mathematical foundations, model building andassessment, algorithms and software foundation, data curation, and knowledge transference(communication and responsibility)[11]. Six main subject areas of a Data Science Major wereidentified; data description and curation, mathematical foundations, computational thinking,statistical
Conference Session
Computing and Information Technology Division Technical Session 9
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Wendi M. Kappers, Embry-Riddle Aeronautical University, Daytona Beach; Martha Nanette Harrell, Arkansas Tech University
Tagged Divisions
Computing and Information Technology
field. However, the higher-level career position, such as theCISO, is fairly new and requires extensive knowledge and skills to ensure success. ManyMaster’s level programs include courses that address these skills in an attempt to provide a well-rounded program of study, but undergraduates who are in the practitioner’s world have otheralternatives to gain these skills. These individuals can gain various certifications, such as theCertified Information Systems Security Professional (CISSP) or the Certified InformationSecurity Manager (CISM). Due to a perceived gap between academics and field knowledge, itappears that academic programs may not fully consider the very specific competencies of C-Suite members (e.g. Chief Information Security