Asee peer logo
Displaying all 5 results
Conference Session
Computing and Information Technology Division Technical Session 8
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Stephanie J. Lunn, Florida International University; Monique S. Ross, Florida International University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
that require real-time coding on whiteboards,with paper and pencil, or using a simple text editor [11, 13].Currently, multiple papers review the hard and soft skills necessary for career success, [14–19],which skills are knowledge deficiencies for recent graduates [20–25], and a few papers mentionthe hiring process broadly [11, 13, 26]. However, more work is needed to describe what hiring incomputing looks like, and what employers want from applicants. Furthermore, many reports andarticles state that there is a diversity problem in computing, but rarely do these works examinehow viable candidates are lost during the hiring process. Before we can identify biases in thesystem, it is necessary to first gather the existing work on the hiring
Conference Session
Computing and Information Technology Division Technical Session 4
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Stephanie J. Lunn, Florida International University; Monique S. Ross, Florida International University; Zahra Hazari, Florida International University; Mark A. Weiss, Florida International University; Michael Georgiopoulos, University of Central Florida; Ken Christensen P.E., University of South Florida; Tiana Solis, Florida International University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Conference Session
Computing Technology Applications-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Vuk Marojevic, Virginia Tech; Antoni Gelonch-Bosch, Universitat Politècnica de Catalunya; Jeffrey Reed, Virginia Tech
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
environment (ALOE) to provide a practical learning environmentthat facilitates developing many of the needed technical and soft skills without the inherentdifficulty and cost associated with radio frequency components and regulation. We define sixlearning stages that assimilate the standardization process and identify key learning objectivesfor each. We discuss our experiences when employing the proposed methodology at BarcelonaTech in Spain, compare the approach with an equivalent class at Virginia Tech in the US andmake the following observations: (1) The complexity of standards need to be abstracted andpresented in a form suitable for a given class. (2) Educating about cellular communicationsstandards is most effective when students are immersed
Conference Session
Computing and Information Technology Division Technical Session 2
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Ida B. Ngambeki, Purdue University, West Lafayette; Marcus Rogers, Purdue University, West Lafayette; Sienna Jasmine Bates, Purdue University, West Lafayette; Megan Celeste Piper
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
categories.Drawbacks of the NICE FrameworkWhile the NICE Framework provides a significant advantage in allowing for a mapping thatfrom both a knowledge and a workforce perspective, it does have some drawbacks.There are several areas important to a well-rounded education that are not directly addressed bythe NICE Framework. A cybersecurity professional needs a working knowledge of mathematicsand various sciences beyond those strictly related to security. Some of this knowledge can beconsidered prerequisite for a deep understanding of cybersecurity e.g., calculus. Some of thisknowledge is necessary for job roles that integrate with cybersecurity roles e.g., economics. Andsome is necessary for addressing the soft skills necessary to be successful in a workplace
Conference Session
Computing and Information Technology Division Technical Session 5
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Shinelle Hutchinson, Purdue University, West Lafayette; Yung Han Yoon, Purdue University, West Lafayette; Neesha Shantaram; Umit Karabiyik, Purdue University, West Lafayette
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
://www.makeuseof.com/tag/alexa-amazon-echo-privacy-risk/, Jan 2018. Last Accessed: 03-16-2020.[19] J. S. Vogler, P. Thompson, D. W. Davis, B. E. Mayfield, P. M. Finley, and D. Yasseri, “The hard work of soft skills: augmenting the project-based learning experience with interdisciplinary teamwork,” Instructional Science, vol. 46, no. 3, pp. 457–488, 2018.[20] E. L. Deci and R. M. Ryan, “Self-determination theory.,” 2012.Appendix A.Software • XRY • Magisk Manager • Magisk • Samsung A505G Stock Firmware (Trinidad and Tobago) - • Odin • TWRP