Asee peer logo
Displaying all 4 results
Conference Session
Computing and Information Technology Division Technical Session 2
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Uma Kannan; Rajendran Swamidurai, Alabama State University
Tagged Divisions
Computing and Information Technology
as computer architectures,cryptography, networking, secure coding, secure system development, penetration testing,incidence response, tool development, operating systems internals (such as Linux), and low-level 2programming [17-21] and how and the organization’s information system operates [22-24], 2)soft skills such as team-work, problem-solving, and communication [25-28], and 3) hands-ontraining on cyber ranges [29]. Cyber range is an interactive simulated representation of anorganization’s cyber infrastructure that includes their local networks, systems, tools, andapplications that provide a safe and legal environment for learning and testing Cybersecurityoperations [30].To address this
Conference Session
Computing and Information Technology Division Technical Session 8
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Stephanie J. Lunn, Florida International University; Monique S. Ross, Florida International University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
that require real-time coding on whiteboards,with paper and pencil, or using a simple text editor [11, 13].Currently, multiple papers review the hard and soft skills necessary for career success, [14–19],which skills are knowledge deficiencies for recent graduates [20–25], and a few papers mentionthe hiring process broadly [11, 13, 26]. However, more work is needed to describe what hiring incomputing looks like, and what employers want from applicants. Furthermore, many reports andarticles state that there is a diversity problem in computing, but rarely do these works examinehow viable candidates are lost during the hiring process. Before we can identify biases in thesystem, it is necessary to first gather the existing work on the hiring
Conference Session
Computing and Information Technology Division Technical Session 4
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Stephanie J. Lunn, Florida International University; Monique S. Ross, Florida International University; Zahra Hazari, Florida International University; Mark A. Weiss, Florida International University; Michael Georgiopoulos, University of Central Florida; Ken Christensen P.E., University of South Florida; Tiana Solis, Florida International University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Conference Session
Computing and Information Technology Division Technical Session 2
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Ida B. Ngambeki, Purdue University, West Lafayette; Marcus Rogers, Purdue University, West Lafayette; Sienna Jasmine Bates, Purdue University, West Lafayette; Megan Celeste Piper
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
categories.Drawbacks of the NICE FrameworkWhile the NICE Framework provides a significant advantage in allowing for a mapping thatfrom both a knowledge and a workforce perspective, it does have some drawbacks.There are several areas important to a well-rounded education that are not directly addressed bythe NICE Framework. A cybersecurity professional needs a working knowledge of mathematicsand various sciences beyond those strictly related to security. Some of this knowledge can beconsidered prerequisite for a deep understanding of cybersecurity e.g., calculus. Some of thisknowledge is necessary for job roles that integrate with cybersecurity roles e.g., economics. Andsome is necessary for addressing the soft skills necessary to be successful in a workplace