Asee peer logo
Displaying all 10 results
Conference Session
Computing and Information Technology Division Technical Session 2
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Uma Kannan; Rajendran Swamidurai, Alabama State University
Tagged Divisions
Computing and Information Technology
as computer architectures,cryptography, networking, secure coding, secure system development, penetration testing,incidence response, tool development, operating systems internals (such as Linux), and low-level 2programming [17-21] and how and the organization’s information system operates [22-24], 2)soft skills such as team-work, problem-solving, and communication [25-28], and 3) hands-ontraining on cyber ranges [29]. Cyber range is an interactive simulated representation of anorganization’s cyber infrastructure that includes their local networks, systems, tools, andapplications that provide a safe and legal environment for learning and testing Cybersecurityoperations [30].To address this
Conference Session
Computing and Information Technology Division Technical Session 8
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Stephanie J. Lunn, Florida International University; Monique S. Ross, Florida International University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
that require real-time coding on whiteboards,with paper and pencil, or using a simple text editor [11, 13].Currently, multiple papers review the hard and soft skills necessary for career success, [14–19],which skills are knowledge deficiencies for recent graduates [20–25], and a few papers mentionthe hiring process broadly [11, 13, 26]. However, more work is needed to describe what hiring incomputing looks like, and what employers want from applicants. Furthermore, many reports andarticles state that there is a diversity problem in computing, but rarely do these works examinehow viable candidates are lost during the hiring process. Before we can identify biases in thesystem, it is necessary to first gather the existing work on the hiring
Conference Session
Computing and Information Technology Division Technical Session 4
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Stephanie J. Lunn, Florida International University; Monique S. Ross, Florida International University; Zahra Hazari, Florida International University; Mark A. Weiss, Florida International University; Michael Georgiopoulos, University of Central Florida; Ken Christensen P.E., University of South Florida; Tiana Solis, Florida International University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Conference Session
Computing and Information Technology Division Technical Session 1
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Mia Minnes, University of California, San Diego; Sheena Ghanbari Serslev, University of California, San Diego ; Madison Edwards
Tagged Divisions
Computing and Information Technology
independentlearning (in which the real-world project provided an equal level of improvement) and teamwork. Chillaset al. [26] document the differences in accessibility of each of these experiential learning programs tostudents: students who demonstrate “softskills appear more likely to gain internships, which may have thestrongest positive outcomes. The wide range of experiential learning programs implemented in universitiesmay serve as a remedy, allowing students a chance to develop the skills necessary to be hired for aninternship by first completing a local experience with lower barriers to participation. In this work we focuson industry internship programs in which students learn and develop the skills needed for an industryposition in CSE through
Conference Session
Computing Technology Applications-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Vuk Marojevic, Virginia Tech; Antoni Gelonch-Bosch, Universitat Politècnica de Catalunya; Jeffrey Reed, Virginia Tech
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
environment (ALOE) to provide a practical learning environmentthat facilitates developing many of the needed technical and soft skills without the inherentdifficulty and cost associated with radio frequency components and regulation. We define sixlearning stages that assimilate the standardization process and identify key learning objectivesfor each. We discuss our experiences when employing the proposed methodology at BarcelonaTech in Spain, compare the approach with an equivalent class at Virginia Tech in the US andmake the following observations: (1) The complexity of standards need to be abstracted andpresented in a form suitable for a given class. (2) Educating about cellular communicationsstandards is most effective when students are immersed
Conference Session
Curriculum and Assessment II
Collection
2019 ASEE Annual Conference & Exposition
Authors
Jingshan Wu, Zhejiang University; Yujie Wang, Zhejiang University; Hanbing Kong, Zhejiang University; Ling Zhu, Zhejiang University
Tagged Divisions
Computing and Information Technology
; algorithm design and solution implementation. Digital Leadership: To initiate and guide computation-related innovation. In other words, those essential soft skills or ways of thinking for a digital age, including system thinking, interdisciplinary or integration skills, innovation and entrepreneurship, multi-cultural teamwork and collaboration skills. Figure 1. The Framework of CT-ENGIII. Case Study: The Robotics Class of Zhejiang University1. Research Design(1) Research MethodThis research adopts the single case study method. Case study research design is anin-depth practical investigation of a current event in the actual context (Yin, 2009).According to (Siggelkow,2007; Gaya H.J& Smith E.E.,2016), a
Conference Session
Curriculum and Assessment III
Collection
2019 ASEE Annual Conference & Exposition
Authors
Jeremy Straub, North Dakota State University
Tagged Divisions
Computing and Information Technology
management [39] and marketing [40]. Further, it hasbeen shown to aid job placement [41] and enhance students’ self-image [42] ‘soft skills’ [43] andcreativity [44].3. Description of Peer Learning ActivitiesAt NDSU, cybersecurity students participate in a number of different types of peer learningactivities. These include activities specifically designed to prepare for cybersecuritycompetitions such as the National Cyber League (NCL) and the Collegiate Cyber DefenseCompetition (CCDC) regional competition. Students also participate in peer learning activitiesrelated to student-driven research projects and identified areas of personal enrichment. Recenttopics of peer learning have included red team and blue team competition preparation, fake
Conference Session
Computing and Information Technology Division Technical Session 2
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Ida B. Ngambeki, Purdue University, West Lafayette; Marcus Rogers, Purdue University, West Lafayette; Sienna Jasmine Bates, Purdue University, West Lafayette; Megan Celeste Piper
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
categories.Drawbacks of the NICE FrameworkWhile the NICE Framework provides a significant advantage in allowing for a mapping thatfrom both a knowledge and a workforce perspective, it does have some drawbacks.There are several areas important to a well-rounded education that are not directly addressed bythe NICE Framework. A cybersecurity professional needs a working knowledge of mathematicsand various sciences beyond those strictly related to security. Some of this knowledge can beconsidered prerequisite for a deep understanding of cybersecurity e.g., calculus. Some of thisknowledge is necessary for job roles that integrate with cybersecurity roles e.g., economics. Andsome is necessary for addressing the soft skills necessary to be successful in a workplace
Conference Session
Computing and Information Technology Division Technical Session 2
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Tamer Omar, California State Polytechnic University, Pomona; Abdelfattah Amamra, California State Polytechnic University, Pomona; Kristina Rigden, California State Polytechnic University, Pomona; Thomas Ketseoglou, California State Polytechnic University, Pomona
Tagged Divisions
Computing and Information Technology
IoT and possible threats, attacksand defense techniques as well as to assist in learning new technologies and tools. In addition,students will be able to increase their skills, knowledge and abilities of IoT and cybersecurity. Thecourse will develop their competency in innovation processes, develop their leadership/soft skills,and prepare them for a career in cybersecurity.The second motivation for this course is the industry trend towards technology convergence intoday’s advanced manufacturing. Industries and organizations are rapidly converging their IT withtheir (Operational Technology) OT to provide new IoT systems. A persistent influx of networkedindustrial control solutions into the manufacturing processes has led to a rapidly growing
Conference Session
Computing and Information Technology Division Technical Session 5
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Shinelle Hutchinson, Purdue University, West Lafayette; Yung Han Yoon, Purdue University, West Lafayette; Neesha Shantaram; Umit Karabiyik, Purdue University, West Lafayette
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
://www.makeuseof.com/tag/alexa-amazon-echo-privacy-risk/, Jan 2018. Last Accessed: 03-16-2020.[19] J. S. Vogler, P. Thompson, D. W. Davis, B. E. Mayfield, P. M. Finley, and D. Yasseri, “The hard work of soft skills: augmenting the project-based learning experience with interdisciplinary teamwork,” Instructional Science, vol. 46, no. 3, pp. 457–488, 2018.[20] E. L. Deci and R. M. Ryan, “Self-determination theory.,” 2012.Appendix A.Software • XRY • Magisk Manager • Magisk • Samsung A505G Stock Firmware (Trinidad and Tobago) - • Odin • TWRP