Asee peer logo
Displaying results 121 - 150 of 154 in total
Conference Session
Tools and Techniques
Collection
2018 ASEE Annual Conference & Exposition
Authors
Mohammad Rafiq Muqri, DeVry University, Pomona; Nikole Harper; Hasan Muqri; Brian Keith Wesr Sr.
Tagged Divisions
Computing and Information Technology
statistical software is strongly dependingon the context where we have to undertake the decision. Constraints like the budget,the surrounding IT infrastructure, the level of programming knowledge and skills ofend user, the extent to which the statistical analysis has to be addressed, and manyother context-based elements are much more than factors, they open to differentscenario and require more than a reflection.Table 1 is a partial comparative list of different statistical software used at ouruniversity by undergraduate and graduate students. It is not complete but gives aglimpse of its capabilities.Table 1. Which Statistical Software to be used DataSoftware Learning
Conference Session
Topics in Computing and Information Technology-III
Collection
2018 ASEE Annual Conference & Exposition
Authors
Reza Kamali-Sarvestani, Utah Valley University; Brian Durney, Utah Valley University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
interactive version of the "Powers ofTen" video [1] and helps players understand powers of ten and exponents.During the course of the game, players explore the museum and solve puzzles. Some puzzlesrequire the player to estimate the size of an object by finding the floor with an exhibit of thatobject and then clicking on that exhibit. Other puzzles give the player a definition or descriptionof an object and then require the player to click on the exhibit that matches the description.Critics of educational games sometimes compare them to chocolate-covered broccoli and saythat instead of making learning more fun they actually make it worse, just as chocolate-coveredbroccoli is less appetizing than plain broccoli [2]. In this paper we describe how
Conference Session
Tools and Techniques
Collection
2018 ASEE Annual Conference & Exposition
Authors
Karen H. Jin, University of New Hampshire; Michael Jonas, University of New Hampshire; Christopher David LeBlanc, University of New Hampshire; Theodore Sean Tavares, University of New Hampshire
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
introduced anundergraduate research project to augment the Internship experience with relative success [1],[2] and engineering technology has introduced options for its seniors to work in internally fundedprojects as well [3]. This paper will compare and contrast these two techniques of providingstudents with Capstone project experience to highlight the pros and cons of each. With a mix ofboth industry experience and faculty guided work, the aim is to provide an optimal approach thatbenefits students, industry partners, and faculty involved in this very important element to four-year educational degree program.IntroductionThe University of New Hampshire at Manchester (UNH-M) offers degrees in both computingand engineering technologies in the Applied
Conference Session
Computing Technology Applications-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Yun Dai, University of Southern California; Tianmeng Li, University of New South Wales; Ang Liu, University of New South Wales; Stephen Lu, University of Southern California
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
feedback provided by individual students, the platform functions to dividea large class into multiple small study groups, within which, students can engage in peerinstruction to learn from each other. Meanwhile, the platform will provide instructor with theaggregated, analyzed, and visualized student feedback, which can be used to redesigninstruction in classroom. Made possible by the Viterbi iPodia platform at University ofSouthern California, this platform has been tested based on a technology-enabledinternational course that was attended by 138 students from 8 global universities.IntroductionThe instructional strategy of flipped classroom is increasingly embraced by the engineeringeducation community [1-2]. According to the survey conducted by
Conference Session
Computing & Information Technology: Curriculum and Assessment
Collection
2018 ASEE Annual Conference & Exposition
Authors
Shanon Marie Reckinger, Stanford University; Bryce E. Hughes, Montana State University
Tagged Divisions
Computing and Information Technology
focus of this practice paper is provide a more holistic discussion of observationsin the classroom and provide narrative feedback from students. The most interesting andrelevant results from this data is summarized in the following section.Results and DiscussionStudent Feedback on PartneringStudents generally preferred the partner quizzes over individual quizzes. This data is presentedin previous work (Reckinger, Manuscript in preparation). Table 2 and Table 1 summarizestudents’ negative and positive comments, respectively. These comments presented are chosenas representative of the comments received. These comments indicate that many students foundpartnering helpful for their learning, and helped reduce stress levels during the quiz time. This
Conference Session
Curriculum and Assessment II
Collection
2019 ASEE Annual Conference & Exposition
Authors
Xiannong Meng, Bucknell University; Jianming Deng, Jinling Institute of Technology and Southeast University
Tagged Divisions
Computing and Information Technology
hours per semester.1. IntroductionChina’s undergraduate computing education, started in the late 1950s, has gone throughtremendous changes in recent decades, both in numbers and in contents, in response to thechanging needs of the economy, research, and social development. By 1960, about 15universities in China offered computing related programs2 [1]. According to [2], there are 2,603computing related programs with 901,000 students in these programs in 2015, making up forabout 16 percent of the entire engineering student body in China. The graduates coming out ofthe pipelines are playing increasingly more important role in science, engineering, andeconomics of the country in general. The graduates are also becoming very competitive atvarious
Conference Session
Curriculum and Assessment III
Collection
2019 ASEE Annual Conference & Exposition
Authors
Xiaoyan Gong, Institute of Smart Education, Qingdao Academy of Intelligent Industries. ; Liang Zhao, Faculty of Information Technology, Beijing University of Technology; RenHao Tang, Faculty of Information Technology, Beijing University of Technology; YaNa Guo, Faculty of InformationTechnology,Beijing University of Technology; Xiwei Liu, Qingdao Academy of Intelligent Industries; Institute of Automation, Chinese Academy of Sciences; Jian He, Faculty of Information Technology, Beijing University of Technology; Fei-Yue Wang, National Key Laboratory of Management and Control for Complex Systems, Chinese Academy of Sciences; Ying Tang, Rowan University; Wanruo Shi, Beijing Normal University; Xiaojie Niu, Beijing Normal University; Xinzhu Wang, Beijing Normal University
Tagged Divisions
Computing and Information Technology
promote the development and use of AI. Forinstance, on Mar. 1st, 2018, the Center for Strategic and International Studies (CSIS) released“A National Machine Intelligence Strategy for the United States” [1]. Other countries, suchas Britain, Germany, France,Japan, Korea, Singapore, and Canada have also issued strategieson various aspects of AI policy. This paradigm shift has a significant impact on skills needed for a diverse science and en-gineering workforce that is capable of designing and deploying AI-based systems, tools andservices. However, our education has not kept pace with this evolution, especially at K-12level. In fact, there is a crucial need to bring AI learning experiences into classrooms of pri-mary and secondary education. As
Conference Session
Curriculum and Assessment I
Collection
2019 ASEE Annual Conference & Exposition
Authors
Peter J. Clarke, Florida International University; Debra Lee Davis, Florida International University; Ingrid A. Buckley, Florida Gulf Coast University; Geoff Potvin, Florida International University; Mandayam Thirunarayanan, Florida International University; Edward L. Jones, Florida A&M University/Florida State University
Tagged Divisions
Computing and Information Technology
professor in the School of Computing and In- formation Sciences at Florida International University. He is a member of the ACM (SIGSOFT, SIGCSE, and SIGAPP); IEEE Computer Society; and a member of the Association for Software Testing (AST).Dr. Debra Lee Davis, Florida International University Dr. Debra Davis is an Instructor in the School of Computing and Information Sciences at Florida Interna- tional University. Her research interests emphasize interdisciplinary topics including understanding and improving: (1) Computer Science education, including increasing participation of women; (2) educational applications and techniques for online STEM learning; and (3) complex human-machine interactions. She has a Ph.D. and M.A
Conference Session
Computing Research I
Collection
2019 ASEE Annual Conference & Exposition
Authors
Chaomin Luo, Mississippi State University
Tagged Divisions
Computing and Information Technology
were assigned to students to cover various previous topics in thiscourse, which assist in student learning enhancement of hardware and programming skills inComputer Architecture course. Satisfactory performance was evaluated by various milestonereview sessions, assignments, in-class exercises, exams and other activities. Results of learningoutcomes and assessment indicate that this integrated learning pedagogy is effective and efficientin student learning and improving the quality of computer design and organization.1. IntroductionIn higher education, especially, in engineering education, all the effort of educators is focused oneducating students to be qualified for their future professionals. To achieve these learningoutcomes in engineering
Conference Session
Curriculum and Assessment III
Collection
2019 ASEE Annual Conference & Exposition
Authors
Jeremy Straub, North Dakota State University
Tagged Divisions
Computing and Information Technology
to engage students in was that instructional staff do not.Effective peer learning activities may also aid the scalability of cybersecurity degree programs,which is critical given the shortage of qualified instructional staff and immense need forqualified security professional graduates from degree programs. This paper presentscybersecurity peer learning activities conducted at the North Dakota State University andassesses them using a student survey. It demonstrates the efficacy of these activities forincreasing students’ technical skills and excitement about the topics of the peer learningactivities.1. IntroductionThere is a significant and growing need, both in the United States and around the world, forgraduates with strong skills in the
Conference Session
Computing Research II
Collection
2019 ASEE Annual Conference & Exposition
Authors
Rendong Bai, Eastern Kentucky University; Wutthigrai Boonsuk, Eastern Illinois University; Peter P. Liu
Tagged Divisions
Computing and Information Technology
(NSC) estimated automotive fatalities topped 40,000 in 2017 [1]. Recent NationalHighway Traffic Safety Administration (NHTSA) research shows that approximately 94 percentof accidents are caused by human error, including around 40 percent involving intoxicateddrivers and 10 percent distracted drivers [2].Self-driving vehicles could dramatically reduce the number of accidents. The sensors on a self-driving car are always observing. They are not affected by the state of the driver (fatigue,emotion, etc.) and can scan in multiple directions simultaneously. The software on an 2autonomous vehicle could prove to be less error-prone than human. Cars with advance safetyfeatures and eventually self-driving
Conference Session
Computing & Information Technology: Curriculum and Assessment
Collection
2018 ASEE Annual Conference & Exposition
Authors
Michael Oudshoorn, Northwest Missouri State University; Rajendra K. Raj, Rochester Institute of Technology; Stan Thomas, Wake Forest University; Allen Parrish, United States Naval Academy
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
globalsociety at large.Index terms— Computing accreditation, program accreditation, best practices, quality improve-ment.1 IntroductionABET 1 is the main accreditation body for programs in Computing, Engineering, EngineeringTechnology, and Applied and Natural Science in the United States. Currently, ABET accredits3,709 programs at 752 universities in the United States and 29 other countries 2 . ABET is orga-nized into four commissions that carry out accreditation activities in their respective disciplineareas of applied and natural sciences, computing, engineering, and engineering technology. Tobe accredited, a program must satisfy ABET’s criteria that are centered on what students actuallylearn, whether the curriculum, faculty and facilities are
Conference Session
Computing Research
Collection
2018 ASEE Annual Conference & Exposition
Authors
Deng Cao, Central State University; Cadance Lowell, Central State University; Augustus Morris, Central State University
Tagged Divisions
Computing and Information Technology
, CNN is introduced to theundergraduate students in our institution and the students are trained to develop customizedCNN in order to solve given image classification problems. The achieved goals anddiscovered issues are reported and discussed in this work. Overall, the results demonstrateda positive example of integrating modern technology and research into undergraduateclassrooms.1. IntroductionIn recent years, the explosion of Artificial intelligence (AI) has made it one of the mostintriguing research topics in the world. A recent Forbes report indicated that 80% ofenterprises already have some form of AI in production today, and 30% of enterprises areplanning on expanding their AI investments over the next 36 months1. Another recentreport
Conference Session
Topics in Computing and Information Technology-III
Collection
2018 ASEE Annual Conference & Exposition
Authors
Landon A. Braden; Scott Alexander Kaiser, Utah Valley University; Reza Kamali-Sarvestani, Utah Valley University; Afsaneh Minaie, Utah Valley University; Paul Weber, Utah Valley University
Tagged Divisions
Computing and Information Technology
correctsafety procedures in the virtual lab, often through trial and error, and are far less likely to repeat thoseerrors in future use of a real scanning electron microscope.1.0 IntroductionNanotechnology is the science, engineering, and technology that deals with various structures ofmatter that have dimensions on the order of a billionth of a meter. Nanotechnology is the abilityto observe, manipulate, measure, and manufacture things at the nanoscale, which is about 1 to100 nanometers. While the word nanotechnology is new and was introduced in the late 1970s,the existence of functional devices and structures of nanometer dimensions is not new, andactually such structures have existed on earth as long as life itself [1].The idea behind nanoscience and
Conference Session
Topics in Computing and Information Technology-III
Collection
2018 ASEE Annual Conference & Exposition
Authors
Mehmet Ergezer, Wentworth Institute of Technology; Bryon Kucharski, Wentworth Institute of Technology; Aaron Carpenter, Wentworth Institute of Technology
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
approaches is presented from the point of view of the student. Theassessment also asked the student to rate the assignment topics, to list how many hours werespent per each lab, and to propose suggestions for improvement.1 IntroductionLaboratory work is essential for students in the Science, Technology, Engineering, andMathematics (STEM) fields, and its importance is well-studied [1, 2]. Laboratory assignmentsoffer students opportunities for practical applications of theory and have the potential to promoteknowledge acquisition via experimentation. Hands-on learning is an important process forstudents, as active learning achieves positive educational results and prepares students forreal-world problems in the STEM fields [3]. Laboratories allow
Conference Session
Computing Research II
Collection
2019 ASEE Annual Conference & Exposition
Authors
Mysore Narayanan, Miami University
Tagged Divisions
Computing and Information Technology
methods.Procedure At Miami University, The author did not provide the students with a questionnaire to fillout. The rationale being that ‘students are exhausted in filling out forms.’ Some researchersare of the opinion: ‘questionnaire-fatigue’ will result in skewed data that may lead to faultyconclusions. Therefore the assessment data was collected in an indirect manner. The author delivered four content materials in four different modes.Topic 1 was delivered in the traditional Lecture Format. (Aural)Topic 2 utilized Power Point Slides and other Visual Aids. (Visual)Topic 3 was left for the students to read, write and submit their findings. (Reading & Writing)Topic 4 was handled like a laboratory, demonstration, group discussion, etc
Conference Session
Cyber Technology
Collection
2019 ASEE Annual Conference & Exposition
Authors
Kristen Przyborski, University of New Haven; Frank Breitinger, University of New Haven; Lauren Beck, University of New Haven; Ronald S. Harichandran, University of New Haven
Tagged Divisions
Computing and Information Technology
databreaches due to their value on the Dark Web [5]. It is not surprising then that IT professionalsrated information security as the top concern for three years in a row [7]. Additionally, it is also aconcern for parents who are worried about their children losing their identity [19].On the other hand, students spend a lot of time online; 95% of teens aged 13-17 havesmartphones, and 45% of teens report being online almost constantly [1]. The vast majority ofAmericans in the 18-24 year age range report using social media, particularly Youtube (91%),Facebook (80%), Instagram (71%), and Snapchat (78%) [1]. However, according to an online pollconducted by the Pew Research Center [17], people 18-29 years old on average only answered 6out of 10
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Jeong Yang, Texas A&M University-San Antonio; Brandon Earwood, Texas A&M University-San Antonio; Young Rae Kim, Texas A&M University-San Antonio; Akhtar Lodgher, Texas A&M University - San Antonio
Tagged Divisions
Computing and Information Technology
security modules with theMEA project improved their understanding of the course materials and their interests incomputer science. After implementing security modules with the MEA project, students showeda better understanding of cyber security concepts and a greater interest in broader computerscience concepts. The instructor’s beliefs about teaching, learning, and assessment shifted fromteacher-centered to student-centered, during his experience with the security modules and MEA.1. IntroductionSoftware impacts a large number of people’s lives in a myriad of ways. Software security isessential for guaranteeing that software is safe and behaves as intended. Markettos et aladdressed that we face crises with security vulnerabilities in systems design
Conference Session
Computing and Information Technology Division Technical Session 2
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Saeed Al-Haj, Ohio Northern University
Tagged Divisions
Computing and Information Technology
Internet and the usage of computer and mobileapplications, the need for cybersecurity professional and experts will continue to expand.Therefore, graduating students who have proper cybersecurity instruction becomes a necessity.This can be achieved by incorporating modern security analysis tools and engaging students inbuilding secure systems throughout the undergraduate curriculum. The primary goals are: 1) tohave more systems and products with fewer exploits and vulnerabilities, and 2) to increase thenumber of professional individuals who are interested in cybersecurity careers and have the propercybersecurity knowledge and training.One key challenge in implementing and designing cybersecurity exercises in classrooms is havingthe proper
Conference Session
Computing and Information Technology Division Technical Session 3
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Margaret Ellis, Virginia Tech; Catherine T. Amelink, Virginia Tech; Stephen H. Edwards, Virginia Tech; Clifford A. Shaffer, Virginia Tech
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
expected to learn such skills on their own. Students with less pre-college orextracurricular computing experiences may have fewer of these practical skills and lessexperience learning on their own. Such students may be at an academic disadvantage or feelintimidated 1,2 . Realizing this gap motivated us to revise a key introductory course in ourcurriculum. CS2104 Problem Solving in Computer Science teaches students problem-solvingskills in conjunction with an introduction to various practical computer science topics such asusing version control, developing websites, navigating networks, and interacting with databases.The intention is to: 1. provide practical technical skills needed in a variety of computer science settings, 2. improve problem
Conference Session
Computing and Information Technology Division Technical Session 6
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Natasha Smith P.E., University of Virginia
Tagged Divisions
Computing and Information Technology
instructionaltechnology tools enabled learning. The tools were selected to engage students in multiple formats:1) those that attended class in person, 2) those who participated in the live stream class, and 3) thosewho would watch the recorded class later in the day. The Matlab Grader feature was instrumentalin providing students practice with computational solutions to vibrations problems. With this tool,instructors create assignments that students solve with a Matlab script. When the student submitshis or her own code, it is automatically graded against the specified output of the instructor solution.Though it would be useful regardless of delivery mode, the Grader was particularly valuable ingetting real-time feedback to students in keeping with the fast pace
Conference Session
Computing and Information Technology Division Technical Session 2
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Tamer Omar, California State Polytechnic University, Pomona; Abdelfattah Amamra, California State Polytechnic University, Pomona; Kristina Rigden, California State Polytechnic University, Pomona; Thomas Ketseoglou, California State Polytechnic University, Pomona
Tagged Divisions
Computing and Information Technology
framework for students’ collaboration on a practical project. The frameworkconsists of four modules divided between the three disciplines: 1) project scope, systemintegration, and teamwork incorporation; 2) system engineering, cybersecurity design, andapplication development; 3) system cybersecurity algorithms, data collection, organization, andanalytics; 4) system business planning, cybersecurity applications operations implementation, andmaintenance. The paper also presents an example for an IoT based project to apply the frameworkand show the projected course model in developing the IoT project.INTRODUCTIONThe demand for qualified cybersecurity professionals is increasing in an unprecedented rate.Advancement in Internet of Things (IoT) and
Conference Session
Computing and Information Technology Division Technical Session 5
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Shinelle Hutchinson, Purdue University, West Lafayette; Yung Han Yoon, Purdue University, West Lafayette; Neesha Shantaram; Umit Karabiyik, Purdue University, West Lafayette
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
andgraduate) work under the supervision of their faculty advisor to populate this lab with relevantIoT devices to simulate that of a smart home. This setup would allow us to simulate possiblereal-world smart home events (i.e. IoT device compromise, IoT device as a witness) which we canthen investigate to both find answers to aforementioned questions and develop efficient methodsto investigate these IoT devices. In this paper we will discuss several ways in which IoT devicesin a smart home can be compromised and also investigate these devices after the compromise todetermine what data can be recovered, how to recover the data and where this data resides.1 IntroductionInternet connected devices are constantly being introduced to the public as
Conference Session
Computing and Information Technology Division Technical Session 5
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Jared Oluoch, University of Toledo
Tagged Divisions
Computing and Information Technology
October 2000. In thegeneral review of 2006, the CSET program was reviewed by both Computing AccreditationCommission (CAC) and TAC of ABET. The CSET program is currently accredited by both CACand Engineering Technology Accreditation Commission (ETAC) - the successor of TAC. Thispaper demonstrates how the CSET program, housed in the Department of EngineeringTechnology at The University of Toledo, satisfies both ABET Computing AccreditationCommission (CAC) and Engineering Technology Accreditation Commission (ETAC) curriculumrequirements. CSET Science Engineering TechnologyFigure 1. Relationship between CSET and Computer Science and Engineering ProgramFigure 1 illustrates the ideal relationship between the
Conference Session
Computing and Information Technology Division Technical Session 5
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Bin Cong, California State University at Fullerton; Christopher Ryu, California State University at Fullerton; Raman Menon Unnikrishnan, California State University at Fullerton
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
accreditation. Revisions in accreditationcriteria, however small, require reformatting the entire process. The shift from the iconic“(a) thru (k)” student outcomes to the newly minted “(1) thru (5) plus one [1]” may havebeen an improvement, but the effort involved in the transition at the program level has beenhuge. Furthermore, a major disconnect continues to exist between the vocabulary used inindustry (affecting part-time faculty) and that used by accreditation professionals. Severalauthors have investigated these issues and reported their findings but very few results areapplicable to EAC and CAC programs equally [9-19].As a result, the proverbial wheel of assessment and continuous improvement to address theaccreditation needs has been routinely
Conference Session
Computing and Information Technology Division Technical Session 3
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Caleb James O'Malley, University of Florida; Ashish Aggarwal, University of Florida
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
a two-credit course, out of which 29were also enrolled in a one-credit programming lab course. We find that overall lab enrollment isa factor affecting student performance. However, students with little to no prior programmingexperience benefit significantly more from the lab, compared to students with substantialprogramming experience. This effect is further found to be concentrated towards the first half ofthe course, implying a greater importance of the lab in the first few weeks of the course. Theseresults will help guide instructors in tailoring the course design to meet the needs of studentswith varying prior programming experiences.1. BackgroundIntroductory programming courses have a reputation for being difficult and continue
Conference Session
Computing and Information Technology Division Technical Session 7
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Radana Dvorak, University of Portland; Heather Dillon, University of Portland; Nicole Ralston, University of Portland; Jeffrey Matthew Welch, University of Portland
Tagged Divisions
Computing and Information Technology
security issues in their software engineering careers.Students were asked to rank the learning objectives on a Likert scale of 1 to 5 where 1 was theworst ranking and 5 was the best ranking Generally, the results of the survey demonstratedstudents ranked the objectives well, with the lowest score for the objective about developing anaction plan for ethics indicating ways to improve the module in future course offering. Thehighest values were given to considering multiple viewpoints, indicating the mindset aspects ofthe project may have been successful.Based on the outcome and student feedback recommendations for future implementation of themodule in the curriculum is discussed.IntroductionThis paper describes a classroom module designed to develop
Conference Session
Computing and Information Technology Division Technical Session 8
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Afsaneh Minaie, Utah Valley University; Reza Sanati-Mehrizy, Utah Valley University; Janis P. Raje
Tagged Divisions
Computing and Information Technology
fill itscommunity college mission, the institution maintains an open-enrollment policy. To facilitateacademic robustness, UVU has implemented a structured enrollment policy that establishesrequirements which students must meet before they can engage in all the courses of their majorand provides additional access to advising and other resources [1]. These additional preparatorycourses increase students’ time to graduation but help them to succeed.As a large public university UVU has a very high number of low-income students (42%) – thehighest in the state. Around 35% of students are classified as non-traditional students (age 25 orolder), more than half of whom are married. Nineteen percent of students have children underthe age of five. UVU’s
Conference Session
Computing and Information Technology Division Technical Session 9
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Wendi M. Kappers, Embry-Riddle Aeronautical University, Daytona Beach; Martha Nanette Harrell, Arkansas Tech University
Tagged Divisions
Computing and Information Technology
differingexpectations of the position [1]. Therefore, the initial phases of this study focus solely upon thisposition as the starting benchmark.This paper explores historical aspects of the workforce skills gap in the area of computer securitywhile providing survey validation results from Phase I of this project. This pilot investigationinvited faculty (n=5; 24% response rate) who are both practitioners and academicians to supportthis examination and the acceptance of said framework. Demographic data includes acomparison between degree attainment and employment position, and asked respondents tocompare academic preparatory tasks to that of required job market skills - those skills collectedfrom the literature and employment position descriptions taken from
Conference Session
Computing and Information Technology Division Technical Session 9
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Mudasser Fraz Wyne, National University; Catrina Ann Shanas; Ashley Pratt, National University; Sophie Nguyen, County of Los Angeles
Tagged Divisions
Computing and Information Technology
aparticular warranty is nearing expiration. With I-Tracker application, the user would only be required to rememberone username and password and will automatically receive notification by email.IntroductionWe have observed that frequent innovations of electronic appliances in recent years have led notonly to reduction in prices of appliances but also contributes to drop in the sale of extendedwarranty. To increase sales and profitability, [1] proposes offering flexible duration extendedwarranties. However, the continuous flow of documents reaching company back offices that dealin tracking warranty credits, completing purchase orders and replacing equipment, among otherthings, can present substantial financial risks.Many of us have also purchased