$400K to ransomware hackers, 2019. Retrieved from: https://statescoop.com/georgia-county-paid-400k-to-ransomware-hackers/3. D. Kobialka, Regis University Cyberattack: What You Need to Know, 2019. Retrieved from: https://www.msspalert.com/cybersecurity-breaches-and-attacks/regis-university-cyberattack-what-you-need-to- know/4. Symantec, 10 cybersecurity facts and statistics for 2018, 2018. Retrieved from: https://us.norton.com/internetsecurity-emerging-threats-10-facts-about-todays-cybersecurity-landscape-that- you-should-know.html5. T. S. Chou, “Multi-Learning Techniques for Enhancing Student Engagement in Cyber Security Education,” American Society for Engineering Education (ASEE) Annual Conference and
andmultiple virtual machines (VMs) were nested in each environment to serve both tasks of attackand defense. A graphic user interface (GUI) application was designed to provide access to theenvironment where cybersecurity activities were performed. The application menu included a setof CyberSec labs, each containing a pair of attack and defense sub-labs. Each sub-lab is acombination of both cybersecurity theory and practice.A workshop was held in the summer 2019 in the Department of Technology Systems (TSYS) atEast Carolina University (ECU) in the summer of 2019. Nineteen college instructors wereinvited to use the system and participated in a survey in the end of the workshop. In this paper,we discussed the survey results of both the learning
Ph.D.in Educational Research and Policy Analysis from NC State University in 1996. She also has an MBA from Indiana University (Bloomington) and a bachelor’s degree from Duke University. She specializes in eval- uation and research in engineering education, computer science education, and technology education. Dr. Brawner is a founding member and former treasurer of Research Triangle Park Evaluators, an Ameri- can Evaluation Association affiliate organization and is a member of the American Educational Research Association and American Evaluation Association, in addition to ASEE. Dr. Brawner is also an Exten- sion Services Consultant for the National Center for Women in Information Technology (NCWIT) and, in that
Recruitment Tools” in 2019 CoNECD - The Collaborative Network for Engineering and Computing Diversity , Crystal City, Virginia. https://peer.asee.org/31798[7] V. White, S. Lee, L. Lineberry, J. Ivy, C. Grimes, “Illuminating the Computing Pathway for Women in Mississippi”, in 2018 ASEE Annual Conference & Exposition , Salt Lake City, Utah. 10.18260/1-2--30596[8] K. Davis, S. Hardin, “Making STEM Fun: How to Organize a STEM Camp”, Teaching Exceptional Children, Vol. 45, No. 4, pp. 60-76, 2013.[9] http://www.alice.org/[10] https://cyber.org/[11] National Association of Colleges and Employers; “Career Readiness Defined”, https://www.naceweb.org/career-readiness/competencies/career-readiness-defined/[12] http
was conducted to identify the best search strings and databases for our goal[38]. After refining the list, the final search was conducted in March and April of 2020. Allqueries were conducted using the Google Scholar database, the Institute of Electrical andElectronics Engineers (IEEE) Xplore Digital Library, the Association for Computing Machinery(ACM) Digital Library, and conference proceedings from the American Society for EngineeringEducation (ASEE). We used the following search strings: computing interview, computing hiring,computing occupations, computing jobs, technical interviews, technical hiring, technicaloccupations, technical jobs, software engineer* interviews, software engineer* hiring, softwareengineer* occupations, software
level compared to the other twocategories. Such results can help university policymakers in the early identification of morevulnerable students and providing them with financial and academic supports to boost theirengagement with the university.References [1] Doug Shapiro, Afet Dundar, Faye Huie, Phoebe Khasiala Wakhungu, Ayesha Bhimdiwala, and Sean Eric Wilson. Completing college: A national view of student completion rates–fall 2012 cohort (signature report no. 16). National Student Clearinghouse, 2018. [2] Leila Zahedi, Stephanie J Lunn, S Pouyanfar, MS Ross, and MW Ohland. Leveraging machine learning techniques to analyze computing persistence in undergraduate programs. In 2020 ASEE Virtual Annual Conference Content Access
their availability to prepare, including non-computing related jobs, caring for a familymember, or ongoing health issues. While we do consider the support mechanisms students mayleverage to overcome obstacles, in general, these results emphasize the larger issues in existinghiring structures, and demonstrate the importance of not treating students as a monolith. Thefindings from this work are intended to inform educators about how to better prepare students tosucceed on technical interviews, and to encourage industry to reform the process to make it moreequitable.1 IntroductionBetween 2019 and 2029, demand for workers in computing occupations are expected to surge28.8% [1]. For specific positions the projected rate is even higher, with 35.0
and industry-sponsored competitions.Georgia Institute of Technology pairs this continuous learning with a formalized capstone designcourse to further promote experiential opportunities for its students. The student-run Design &Innovation development team embodies extracurricular experiential learning by designing anddeveloping bespoke software solutions to support Georgia Tech’s Interdisciplinary CapstoneDesign (IDCD) program. In 2013, the original team designed these solutions using Django, aPython-based web framework, and Ruby-on-Rails, a web framework written in Ruby. Atransition to the Infinite Blue Platform, a low-code application development platform, was madein 2019 to ensure application sustainability. This transition highlights
publications regarding to the research and educational projects. American c Society for Engineering Education, 2021 2021 ASEE Annual Conference UML Based Design of Employee Information Management System Michael Porter, Phil Bording, and Yujian Fu Alabama A&M UniversityAbstractThis student project developed a Vendor and Employee Management System (VEMS) thatorganizes employees and vendor information using UML model based on object-orientedsoftware development methodology. A good employee and vendor database system is a criticalpiece of software for a business of any size. It is
universities and companies.Dr. Rajendran Swamidurai, Alabama State University Dr. Rajendran Swamidurai is an Professor of Computer Science at Alabama State University. He received his BE in 1992 and ME in 1998 from the University of Madras, and PhD in Computer Science and Software Engineering from Auburn University in 2009. He is an IEEE senior Member and ASEE Member. American c Society for Engineering Education, 2021Integrating Cybersecurity Concepts Across Undergraduate Computer Science andInformation System CurriculumAbstractThe global Cybersecurity skill gap in 2020 is about 3.1 million and the Cybersecurity staffshortage is about 69%. Universities are waking up to
-achieving underserved computing students on the basis of gender, field, and year in school,” in 2018 CoNECD - The Collaborative Network for Engineering and Computing Diversity Conference. Crystal City, Virginia: ASEE Conferences, April 2018, https://peer.asee.org/29535.[16] “NSF scholarships in science, technology, engineering, and mathematics program (S-STEM),” https://www.nsf.gov/funding/pgm summ.jsp?pims id=5257, accessed: 2020-11-16.[17] K. Spiel, O. L. Haimson, and D. Lottridge, “How to do better with gender on surveys: A guide for HCI researchers,” Interactions, vol. 26, no. 4, p. 62–65, Jun. 2019. [Online]. Available: https://doi.org/10.1145/3338283[18] J. Mahadeo, Z. Hazari, and G. Potvin, “Developing a computing
, Communication and Electronics (ETCCE). IEEE, 2020, pp. 1–6. [4] G. Sasi, P. Thanapal, V. Balaji, G. V. Babu, and V. Elamaran, “A handy approach for teaching and learning computer networks using wireshark,” in 2020 Fourth International Conference on Inventive Systems and Control (ICISC). IEEE, 2020, pp. 456–461. [5] M. Kuzlu and O. Popescu, “Upgrading of a data communication and computer networks course in engineering technology program,” in ASEE Annual Conference, 2020. [6] M. Prvan and J. OˇzEGOVI´c, “Methods in teaching computer networks: a literature review,” ACM Transactions on Computing Education (TOCE), vol. 20, no. 3, pp. 1–35, 2020. [7] J. Chandrasekaran, D. Anitha et al., “Enhancing student learning and engagement in the
Progress in Engineering Education. Conference Proceedings (IEEE Cat. No.00CH37135), Oct. 2000, vol. 2, p. S1A/14-S1A/19 vol.2. doi: 10.1109/FIE.2000.896606.[20] H. Shafeek, “Applying Lean Concepts in the Quality Control Systems of Engineering Education — A Case Study,” in 2019 Industrial Systems Engineering Conference (ISEC), Jan. 2019, pp. 1–9. doi: 10.1109/IASEC.2019.8686676.[21] Y. Kalaani and R. Haddad, “Continuous Improvement in the Assessment Process of Engineering Programs,” Proc. 2014 Am. Soc. Eng. Educ. Southeast Sect. Conf., p. 11, Mar. 2014.[22] J. M. Juran, A. B. Godfrey, R. Hoogstoel, and E. Schilling, Eds., Juran’s quality handbook, 5th ed. New York: McGraw Hill, 1999.[23] A. Camacho and Y. Ruiz, “Facing the
Science Course. Paper presented at the ASEE IL-IN Section Conference, Evansville, IN. https://docs.lib.purdue.edu/aseeil- insectionconference/2019/curriculum/4/Steele, C. M. (2011). Whistling Vivaldi: How stereotypes affect us and what we can do: WW Norton & Company.Tobias, S. (1993). Overcoming math anxiety: WW Norton & Company.Van Overwalle, F. (1989). Structure of freshmen's causal attributions for exam performance. Journal of Educational Psychology, 81(3), 400.Walton, G. M., & Brady, S. T. (2017). The Many Questions of Belonging. Handbook of Competence and Motivation: Theory and Application, 272.Walton, G. M., & Cohen, G. L. (2011). A brief social-belonging intervention improves academic and
Services (FIS), and Turkish Airlines. He is a se- nior member of the Association for Computing Machinery (ACM), and a senior member of Institute for Electrical and Electronics Engineers (IEEE); and a member of Engineers Without Borders International (EWB-I), American Society for Engineering Education (ASEE), and Association for Information Systems (AIS).Dr. Kevin N. Bowlyn, Sacred Heart University Kevin N. Bowlyn is an Assistant Professor at Sacred Heart University. His current research interest is focused on a more efficient method for computing a fast Fourier transform (FFT) algorithm. His re- search interests are in digital hardware design, digital signal processing, low area-power circuit designs, embedded
introductory programming,” SIGCSE Bull., vol. 39, no. 2, p. 32–36, Jun. 2007. [Online]. Available: https: //doi.org/10.1145/1272848.1272879 [2] C. Watson and F. W. Li, “Failure rates in introductory programming revisited,” in Proceedings of the 2014 Conference on Innovation & Technology in Computer Science Education, ser. ITiCSE ’14. New York, NY, USA: Association for Computing Machinery, 2014, p. 39–44. [Online]. Available: https://doi.org/10.1145/2591708.2591749 [3] J. Bishop and M. A. Verleger, “The flipped classroom: A survey of the research,” in 2013 ASEE Annual Conference & Exposition, no. 9. Atlanta, Georgia: ASEE Conferences, June 2013, pp. 1–18. [Online]. Available: https://peer.asee.org/22585
education and research. • The ACM Data Science Task Force were tasked in 2017 with providing guidance on data science computing-specific competencies for undergraduate programs [17]. In 2018, the Task Force designed two surveys to gather information from academia and industry on the key Data Science computing competencies. In 2019, they presented these competencies at conferences and meetings and gathered the comments and suggestions from the data science community [17]. Throughout 2019 and 2020, the Task Force continued to solicit comments and suggestions from the data science community and in 2021 the revised list of competencies was published in the January 2021 Computing Competencies
Paper ID #32620Work in Progress: Developing Undergraduate Research Experiences inUnmanned Aircraft Systems (UAS) CybersecurityDr. Matthew A. Verleger (He/His/Him), Embry-Riddle Aeronautical University Matthew Verleger is an Associate Professor of Engineering Fundamentals at Embry-Riddle Aeronautical University in Daytona Beach, Florida. His research interests are focused on using action research method- ologies to develop immediate, measurable improvements in classroom instruction and on the development of software tools to enhance engineering education. Dr. Verleger is an active member of ASEE, having served as the
Chair for the IEEE Conference on Automatic Face and Gesture Recognition (FG) 2018 and 2020. His work on automatic facial expression analysis by computer vision algorithms was featured in Motor Trend Magazine in 2014, 2015 and 2016 for the Best Driver Car of the Year event. Dr. Cruz obtained a few awards for dissemination of research to the greater public (NSF Com- munity Award (2013) and NSF Judges Choice Award (2012) in NSF IGERT Video/Poster Competition). He is a member of the American Society for Engineering Education (ASEE), the Association for Com- puting Machinery (ACM), the Institute of Electrical and Electronics Engineers (IEEE), and the American Society of Agricultural and Biological Engineers (ASABE
Unleashed website:https://engineeringunleashed.com/card/2403 [6]. The card provided the instructional materialmentioned within the paper including the full assignment write ups, examples of student work,instructor notes, rubrics, and an hour-long video presentation of the materials. All of thesematerials can be freely downloaded, modified, and used.Resources[1] “KEEN - Home,” KEEN - Home. [Online]. Available: https://engineeringunleashed.com/.[Accessed: 06-Mar-2021].[2] KEEN - The Framework. [Online]. Available: https://engineeringunleashed.com/framework.[Accessed: 08-Mar-2021].[3] J. B. Hylton, D. Mikesell, J.-D. Yoder, and H. LeBlanc. (2019) “Working to Instill theEntrepreneurial Mindset Across the Curriculum,” Entrepreneurship Education and
research activities, have been invited to number of international conferences as Invited Speaker, chaired panel discussions and numerous international conference sessions. He has served on more than 220 international conference program committees. Furthermore, he has published number of articles in peer- reviewed international journals and conferences. He is an active member of ACM, ASEE, ASEE/PSW and CSAB.Dr. Shakil Akhtar, Clayton State University Dr. Shakil Akhtar is currently Professor of IT and Computer Science at Clayton State University. Be- fore this he was the IT Department head from July 2007 to December 2008. He was a Professor in the College of Information Technology at UAE University from 2002 to 2007