Asee peer logo
Displaying all 14 results
Conference Session
Computing and Information Technology Division Technical Session 7
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Stephen Michael MacNeil, University of California, San Diego; Mohsen M. Dorodchi, University of North Carolina at Charlotte; Erfan Al-Hossami, University of North Carolina at Charlotte; Aileen Benedict, University of North Carolina at Charlotte; Devansh Desai, University of North Carolina at Charlotte; Mohammad Javad Mahzoon, Core Compete Inc.
Tagged Divisions
Computing and Information Technology
futurework.BackgroundRepresenting the curriculum visually helps to communicate the structure, content, and sequenceof the material. Ideally, this process ensures that competencies are sequenced correctly, thatstudents have the freedom to create their own specializations, and that the amount of challenge isspread across the curriculum so that students aren’t overwhelmed in one semester andunder-challenged the next semester. These representations are often based on the curriculumdesigner’s best estimates or based on an existing curriculum. These heuristics do not alwayscorrespond to students’ actual pathways through the curriculum.By plotting students’ temporal pathways through the curriculum, it is possible to see where in thecurriculum students are struggling most, to
Conference Session
Computing and Information Technology Division Technical Session 6
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Vigyan Jackson Chandra, Eastern Kentucky University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Paper ID #29528Drawn together: Integrating words with visuals while annotatingtextbooks and articles for strengthening competencies in computernetworking technologyDr. Vigyan Jackson Chandra, Eastern Kentucky University Vigyan (Vigs) J. Chandra, Ph.D., serves as professor and coordinator of the Cyber Systems Technology related programs offered within the Department of Applied Engineering and Technology (AET) at Eastern Kentucky University. He received his master’s and doctoral degrees from the University of Kentucky in Electrical Engineering, and holds certifications in several computer/networking areas. He teaches courses
Conference Session
Computing and Information Technology Division Technical Session 3
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Vukica M. Jovanovic, Old Dominion University; Murat Kuzlu, Old Dominion University; Otilia Popescu, Old Dominion University; Abdul Rahman Badawi, Old Dominion University; Deborah Kay Marshall, Norfolk Public Schools; Salih Sarp, Old Dominion University; Spyridoula Tsouganatou, Old Dominion University; Petros J. Katsioloudis, Old Dominion University; Linda Vahala, Old Dominion University; Hongyi Michael Wu, Old Dominion University
Tagged Divisions
Computing and Information Technology
and cybersecurity have gained the attention of various stakeholders, industryrepresentatives, educators, parents and students who are thinking about their future careers.Teaching computer science courses has moved into K-12 education, no longer introduced in thecollege classroom. There are various reasons for this trend. One is that in this way more childrenhave access to the curriculum that integrates computer science principles, not just thoseundergraduate students in specific STEM majors. Other industries need different levels ofcomputer science and cybersecurity education. There are various programs across the nation thatare focusing on introducing these topics as early as elementary school through various outreachprograms or even in the
Conference Session
Computing and Information Technology Division Technical Session 5
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Jared Oluoch, University of Toledo
Tagged Divisions
Computing and Information Technology
Paper ID #30354Maintaining Dual ABET Accreditation in a Computer Science andEngineering Technology ProgramDr. Jared Oluoch, University of Toledo Dr. Jared Oluoch is an Associate Professor of Computer Science and Engineering Technology (CSET) at the University of Toledo, OH. He is also the Program Director for the CSET and IT programs, where he is responsible for advising, curriculum development, and ABET accreditation. He received his PhD in Computer Science and Informatics at Oakland University in 2015 c American Society for Engineering Education, 2020 Maintaining Dual ABET Accreditation in a
Conference Session
Computing and Information Technology Division Technical Session 5
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Bin Cong, California State University at Fullerton; Christopher Ryu, California State University at Fullerton; Raman Menon Unnikrishnan, California State University at Fullerton
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Integration (CMMI) is the culmination of an effort to define thestages that software organizations pass through as they gain better and better control overtheir processes. The effort was kicked off by the US Department of Defense and undertakenby the Software Engineering Institute (SEI) at Carnegie Mellon University. The originalproduct that most software developers are familiar with is CMM and it was designed tomeasure the process maturity of a software development organization.In the 1990’s, a veritable galaxy of quality frameworks emerged and CMM was divided intoversions for software development (SW-CMM) and versions for software engineering(SECM) and product development (IPD-CMM). Later in the decade, SEI began an effort tointegrate all of the
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Jeong Yang, Texas A&M University-San Antonio; Brandon Earwood, Texas A&M University-San Antonio; Young Rae Kim, Texas A&M University-San Antonio; Akhtar Lodgher, Texas A&M University - San Antonio
Tagged Divisions
Computing and Information Technology
cybersecurity education including the participation of women. She is an author or co-author of over 30 peer-reviewed journals and conference proceedings in these areas. She is a member of the IEEE Computer Society, ACM, ACM-W, Women in Cyber Security (WiCys), SWE(Society of Women Engineers), and NCWIT(National Center of Women in Technology).Brandon Earwood, Texas A&M University-San AntonioDr. Young Rae Kim, Texas A&M University-San Antonio Young Rae Kim, youngrae.kim@tamusa.edu, is an assistant professor of mathematics education in the Department of Curriculum and Instruction in the College of Education and Human Development at Texas A&M University-San Antonio. His research interests focus on how students
Conference Session
Computing and Information Technology Division Technical Session 2
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Saeed Al-Haj, Ohio Northern University
Tagged Divisions
Computing and Information Technology
summary, this multi-staged project forced students to rethink their designs many timesconsidering the security level of the system. It showed them the importance of building a securesystem at the design stage. IoT and computer security cannot be an afterthought, it must be thefoundation of design.Additional stages can be designed and integrated to the current project depending on the coursethe knowledge level of students in the class.Results and DiscussionTo use this Raspberry Pi kit in classes, instructors need to be aware of students’ knowledge levelon Python programming and using GPIOs in Raspberry Pi. It is noticed that CS students lack somehardware skills in general, while engineering students lack some Python programming knowledge.It is
Conference Session
Computing and Information Technology Division Technical Session 2
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Sin Ming Loo, Boise State University; Liljana Babinkostova
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
; connected communities, and securing cyber-physical systems [4,5], we are not aware that currently exist an educational model that integrates cyber security as partof STEM curriculum. The program’s goal is to broaden knowledge of our STEM graduates to beaware of cyber issues as engineers. The curriculum is shown in Figure 1, where 4 tracks areavailable for the student’s interest and major of study. The courses within each track are existingcourses with security content added to them. Figure 1: Cyber-informed engineering curriculum for STEM majors. Each track gives the students an opportunity to earn a security certificate as part of their undergraduate degree. The color of boxes has no special meaning.The introductory
Conference Session
Computing and Information Technology Division Technical Session 7
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Elsa Q. Villa, University of Texas at El Paso; Ann C. Gates, University of Texas at El Paso; Sanga Kim, University of Texas at El Paso ; David S. Knight, University of Washington
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Paper ID #31526The CAHSI INCLUDES Alliance: Realizing Collective ImpactDr. Elsa Q. Villa, University of Texas at El Paso Elsa Q. Villa, Ph.D., is a research assistant professor at The University of Texas at El Paso (UTEP) in the College of Education, and is Director of the Center for Education Research and Policy Studies (CERPS). Dr. Villa received her doctoral degree in curriculum and instruction from New Mexico State University; she received a Master of Science degree in Computer Science and a Master of Arts in Education from UTEP. She has led and co-led numerous grants from corporate foundations and state and
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Abul K. M. Azad, Northern Illinois University
Tagged Divisions
Computing and Information Technology
are a number offactors that hinder acceptance of remote laboratories as a part of a curriculum. These are:Integration of a number of disciplines into remote experimentation design; Modularity indesigns; Readily available commercial products; Integration of learning management system;Maintenance and training; Administrative awareness and support; and Industry applications.The first part of the paper will discuss these issues and will highlight how we can moveforward in a coordinated manner so there will be a viable remote experimentationinfrastructure with a high degree of acceptance.Historically remote laboratories are developed by utilizing personal computers orworkstations as the main controller unit on the experiment side and a local
Conference Session
Computing and Information Technology Division Technical Session 3
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Margaret Ellis, Virginia Tech; Catherine T. Amelink, Virginia Tech; Stephen H. Edwards, Virginia Tech; Clifford A. Shaffer, Virginia Tech
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
this course are offered with total enrollment varyingbetween 115 to 255, this number is expected to rise. This course has CS1 as a prerequisite so weexpect students to have some programming experience. We chose to use python in this course, asit is easy-to-use across many topics. It is a bonus that this allows us to introduce a language that isotherwise not a standard part of our lower-division curriculum.Our experience working with undergraduate research students helped inform our decisions abouttechnologies and approaches for this course. Mentoring undergraduate research students as theylearned python, git, and SQL helped reinforce the need for these topics in our curriculum andprovided an opportunity to try various tutorials, IDEs, and
Conference Session
Computing and Information Technology Division Technical Session 1
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Mia Minnes, University of California, San Diego; Sheena Ghanbari Serslev, University of California, San Diego ; Madison Edwards
Tagged Divisions
Computing and Information Technology
[school anonymized for publication] change as a result of your internship? How will yourexperiences this summer shape your approach to next quarter and beyond?” at the end of their internship.This mixed-methods approach helps us track students’ motivations, perspectives, and plans for action andsituates their internship as an integral part of their CSE undergraduate education.B. Background 1) The role of motivation in learning: Motivation is critical to learning and leads one to pursueand continue to pursue an objective [1, Part II]. Importantly, motivation is believed to be an emergentphenomenon, meaning it can develop over time and be updated based on new experiences. As described in[2], self-efficacy theory [3] and situational interest
Conference Session
Computing and Information Technology Division Technical Session 6
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Peng Li, East Carolina University
Tagged Divisions
Computing and Information Technology
computing have facilitatedthe development of cloud computing services. Cloud computing is an approach for deliveringapplications and services, on demand, over a private or public network, by leveraging efficientresource pooling of virtual infrastructure. Using virtualization and cloud computing technologiesin education could help lessen hardware costs, increase the availability of resources, andaccelerate deployment of new curriculum material [4] - [8]. Some studies indicated that studentsconducting virtual labs performed as well as students using physical labs in a traditionalenvironment [9], [10].In a decentralized, individual approach, the virtual environment is hosted on students’ personalcomputers. Examples of software we used include VMware
Conference Session
Computing and Information Technology Division Technical Session 9
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Wendi M. Kappers, Embry-Riddle Aeronautical University, Daytona Beach; Martha Nanette Harrell, Arkansas Tech University
Tagged Divisions
Computing and Information Technology
Officer (CISO)) since field certification may bethe only validation of such skills. Therefore, this work-in-process seeks to investigate the use ofa framework to examine the degree to industry employment skill variance, if any, betweenindustry and academic preparation and the perceived required skills that each group expects thegraduate to have mastered.Previous research used a systematic approach, such as DACUM, to integrate the perceptions ofpractitioners in the field with that of the academicians to establish the desired curriculum. Thisprocess is especially useful when the degree is designed to meet emerging new occupations orjob titles, such as the Chief Information Security Officer [2][3]. However, little research can befound that uses the