valuable addition tothe electrical engineering curriculum.We argue that the reasons behind the technical choices, their impact on the resource consumptionand the performance versus flexibility tradeoffs are relevant for cellular communicationsstandards education. Moreover, project management, team work, development of realisticexpectations and practical solutions are skills that are much demanded by industry in addition todomain-specific technical specialization. We therefore propose a methodology for teachingstandards that creates favorable conditions for developing those skills.The combination of lecture-centered education [2] with laboratory-centered approaches [3], [4],has been adopted in the engineering curriculum when the Conceive, Design
Paper ID #33834Using Data Science to Create an Impact on a City Life and to EncourageStudents from Underserved Communities to Get into STEMProf. Elena Filatova, City University of New York Assistant Professor at CUNY, New York City College of Technology, Department of Computer Systems Technology. Director of the Bachelor of Science in Data Science program.Dr. Deborah Hecht, Center for Advanced Study in Education As Director of the Center for Advanced Study in Education, at the CUNY Graduate Center I am involved in a wide range of educational evaluations of funded and local projects. I also mentor graduate students interested
ConclusionThe course uses a variety of problem-solving strategies and encourages practice, exploration, andtinkering to increase students’ comfort not only with their technical skills but also with theirability to acquire new skills. Students can thus approach future coursework, research, andinternships with some introductory experience with version control, security, command line tools,web development, and user-centered design. The course is significantly composed of classworkactivities so that students are highly engaged and regularly expected to work with their peers.Furthermore, this course could be a gateway for students to engage in more computing experienceoutside of their college coursework: hackathons, online coding challenges, computing clubs
undergraduate research, which is one of fivehigh-impact practices found by Brownell and Lynn to improve engagement and retention incollege students [10]. We support 10 students to participate in summer research each year andencourage our Scholars to seek summer research opportunities in other schools.The third component provides funding for up to 10 students each year to attend professionalconferences such as The Richard Tapia Celebration of Diversity in Computing, The GraceHopper Celebration of Women in Computing, and other conferences that students haveexpressed interest in. Attending a professional conference is an effective approach to recruit andretain students, particularly URSs in computing majors [11], [12].In the rest of the paper, we share
Paper ID #25702Using a Data Science Pipeline for Course Data: A Case Study Analyzing Het-erogeneous Student Data in Two Flipped ClassesAsuman Cagla Acun Sener, University of Louisville Asuman Cagla Acun Sener holds B.S. and M.S. degrees in Computer Science and Computer Engineer- ing. She is currently pursuing a doctoral degree in Computer Science at Knowledge Discovery & Web Mining Lab, Department of Computer Science and Computer Engineering, University of Louisville. She is also working as a graduate assistant. Her research interests are educational data mining, visualization, predictive modeling and
and introduces students to a second programming language, R, whichis commonly used for data analysis purposes.4. Program AssessmentOne of our programmatic concerns was to develop pedagogical practices that were best suited tothe needs of students we aimed to attract. In order to monitor the impact of our efforts, wedesigned surveys and conducted focus groups to gather students’ feedback about the courses andthe ACBSS program in general. In this section, we briefly report assessment results including(1) surveys completed by ENGR 120 students at the end the of Fall 2016 and 2017 semesters, (2)focus group results conducted by an external evaluator for ENGR 121 in Spring 2017, and (3)focus group results for ENGR 122 in Fall 2017.In addition to
have been incorporated into all facets of life, from the medicalindustry to transportation and it has even made its way into our homes. These devices have accessto vast amounts of data, especially personal data. However, due to the compact nature of thesedevices, insufficient effort has been made to incorporate security into their design. With that inmind, IoT devices are treasure-troves of potential evidentiary data for forensic investigators,especially when these devices are used to aid in criminal activities. Concerning IoT devices, thereis a need to investigate these devices to find answers to questions such as, what data can berecovered from these devices along with their respective smartphone applications? What methodswould be best
from FIU.Dr. Monique S. Ross, Florida International University Monique Ross, Assistant Professor in the School of Computing and Information Sciences and STEM Transformation Institute at Florida International University, designs research focused on broadening par- ticipation in computer science through the exploration of: 1) race, gender, and disciplinary identity; 2) discipline-based education research (with a focus on computer science and computer engineering courses) in order to inform pedagogical practices that garner interest and retain women (specifically Black and His- panic women) in computer-related engineering fields.Prof. Zahra Hazari, Florida International University Zahra Hazari is an Associate Professor
two offerings of the course were students fromComputer Science, Electrical Engineering, and Mechanical Engineering while the program is alsoopen to students from Civil Engineering and Mathematics. The curriculum was structured whereall credit hours earned contribute to their graduation requirements. The introductory course is anelective course. The objective is not for students to be security experts, rather it is about knowingenough to understand cyber threat impacts to the system design process, understand how to protectagainst such threats, and be able to know when to call the cybersecurity experts. Although thereare many degree programs in cybersecurity as a major and research in cyber physical systemrelated to smart infrastructure &
current research is focused towards Rapid Application Development.Arjun Shakdher, Purdue University Arjun Shakdher is currently a graduate student in the department of Computer and Information Tech- nology at Purdue University. He has been working as a Graduate Research Assistant since 2017 on an NSF-funded program called TECHFIT, focused on Computational Thinking. His interest lies in Software Development, Cloud Engineering, Machine Learning, Network/Cyber Security, Analytics, Data Science and IT Project Management. He has previously worked as a Software Development Engineer at Ericsson and is an incoming Cloud Engineer at Amazon (2019). c American Society for Engineering Education, 2019
cyber-crimes impacting citizens and businesses. Dr. Bou-Harb holds a Ph.D. degree in computer science from Concordia University in Montreal, Canada, which was executed in collaboration with Public Safety Canada, Industry Canada and NCFTA Canada. His research and development activities and interests focus on operational cyber security, attacks’ detection and char- acterization, malware investigation, cyber security for critical infrastructure and big data analytics. Dr. Bou-Harb has authored more than 80 refereed publications in leading security and data science venues, has acquired state and federal cyber security research grants valued at more than $4M, and is the recipient of 5 best research paper awards, including
attendance at the university upon graduation. With 95% of campersindicating that the camp met or exceeded expectations, this is best summed up in the words ofthe camper who commented “I really didn’t have a favorite part, I really just enjoyed all of it!”References[1] J. Faber, L. Grzech, M. Mahmoud, & K. Becker, (2020, June), “The Effect of Summer Engineering Camps on Students’ Interest in STEM” in 2020 ASEE Virtual Annual Conference, Virtual On line . 10.18260/1-2--35309[2] L. Scinski, “Beyond the Classroom: The Impact of Informal STEM Experiences on Student Attitudes and Interest,” University of California, San Diego, United States -- California, 2014.[3] M. Mahmoud, K. Becker, M. Longhurst, R. Dupont, N. Mesner, J
environments that allowed for interaction among each environment, whichmade the learning system as a whole more like a realistic network environment. The systemcould be used in any cybersecurity related undergraduate and graduate courses. It would helpstudents understand the latest cybersecurity technologies. Furthermore, it would provide on-campus and distance education students with opportunities to learn and practice cyberattack andcyber defense techniques used in the real world.In order to maximize the positive impact of the system on cybersecurity education, a two-dayworkshop was held at East Carolina University (ECU) in the summer of 2019. The workshopwas hosted by the Department of Technology Systems (TSYS) and executed in a train-the
Paper ID #23065Modernizing Capstone Project: External and Internal ApproachesProf. Karen H. Jin, University of New Hampshire Karen H. Jin has been an Assistant Professor of Computer Science in Computing Technology program at UNH Manchester since Spring 2016. She previously taught as a lecturer for over ten years in University of Windsor and Dalhousie University. Her interest in computer science education research focuses on devel- oping new empirically supported theories and practices in teaching programming, software engineering and project-based learning with industrial relevance. She received her Ph.D. and M.Sc. in
Computer Science from the University of Nebraska at Omaha.Prof. Matthew MalensekMr. Gian Bruno, University of San Francisco American c Society for Engineering Education, 2021 Work in Progress: Understanding Professional Identity Development Among Computer Science StudentsIntroductionDespite growing enrollments in computing programs, retention, particularly of students fromhistorically marginalized and minoritized groups, remains a challenge [1]. Recent research hasdemonstrated that a stronger sense of disciplinary identity may contribute to increased persistencein STEM fields. A number of High-Impact Educational Practices (HIPs) [2] have been shown
process to ensure an appropriate high-quality program. • Support for professional development. • Modern and appropriate tools and equipment to support the program of study. • Appropriate institutional support to deliver the program of study. • Recruiting faculty who value accreditation because they themselves graduated from an ac- credited program. • A commitment to best practice. • Utilization of data to know how well the program is preparing students through attainment of the student outcomes. • Focus on “student outcomes” rather than “teaching points.” • Engaging stakeholders in the accreditation and continuous improvement processes.Employers hiring graduates of an accredited program see value in the following ways
] “Cybersecurity Curricula 2017 Curriculum Guidelines for Post-Secondary Degree Programs in Cybersecurity,” Dec. 2017.[12] “ABET Approves Accreditation Criteria for Undergraduate Cybersecurity Programs.” https://www.abet.org/abet-approves-accreditation-criteria-for-undergraduate-cybersecurity- programs/ (accessed Jan. 15, 2021).[13] D. H. Tobey, R. A. Gandhi, A. B. Watkins, and C. W. O’Brien, “Competency is Not a Three Letter Word A Glossary Supporting Competency-based Instructional Design in Cybersecurity,” Cybersecurity Skills Journal: Practice and Research, vol. 20, pp. 32–38, 2018, [Online]. Available: https://www.academia.edu/download/57509751/Tobey__Gandhi__Watkins___OBrien_2018_Co
. She worked on the PowerEN Technology, a blur between general purpose and networking processors and hardware accelerators. She identified and studied workloads at the edge of the network that required high-throughput and fast deep-packet processing. Since 2012, her research has been focused on Computer Science Education, especially in the area of peer collaboration, scaling techniques for large courses, auto-graders and learning analytics. She is also working on software that can be used for teaching and learning. She is investigating techniques and best practices on broadening participation in Computer Science. Women and minorities need to be more involved in tech innovation as companies and teams perform
(i.e. that student stress levels tend todecrease after completing the first coding interview and that students tend to find academic valuein the oral proficiency exam process) may help to alleviate anxiety and reduce gaps inbelongingness leading to a more productive and inclusive learning environment. The goal shouldbe to show students the positive impact the coding interview process can have on learning andthe invaluable potential impact the practice has on future job opportunities.ACKNOWLEDGMENTSWe would like to thank the graduate and undergraduate teaching assistants who helped run thecoding interviews. We would also like to thank the 748 students in CS 107 and CS 109 who gavetheir time and effort to their courses and this study. Lastly, we
. Mohammadian, F. D. Mohammadian, and of things (IoT) research, 2006–2018,” Heliyon, D. Assante, “IoT-education policies on national vol. 5, no. 8, p. e02264, 2019. and international level regarding best practices in German SMEs,” in 2020 IEEE Global Engineering Education Conference (EDUCON), 2020, pp.[17] V. D. Soni, “Security issues in using iot enabled 1848–1857. devices and their Impact,” Int. Eng. J. Res. Dev., vol. 4, no. 2, p. 7, 2019.[18] P. Radanliev et al., “Definition of Internet of Things (IoT) Cyber Risk Discussion on a Transformation Roadmap for
- Business Security, Ch. 9, 2018. Taylor & Francis, CRC Group.[6] P. Kendeou, P. Broek, A. Helder, and J. Karlsson J, “A Cognitive View of Reading Comprehension: Implications for Reading Difficulties,” Learning Disabilities Research & Practice, 29(1), pp. 10–16, 2014.[7] L. McGarrity, “What Sentiment Analysis Can Do for Your Brand?” Marketing Profs, April 2016. Available online: https://www.marketingprofs.com/opinions/2016/29673/what- sentiment-analysis-can-do-for-your-brand.[8] A. E. Barth, S. Vaughn, P. Capin, E. Cho, S. Stillman-Spisak, L. Martinez, and H. Kincaid, “Effects of a Text-processing Comprehension Intervention on Struggling Middle School Readers,” Topics in Language Disorders, 36(4), pp. 368-389, 2016.[9] E. M
. Ross, Florida International University Monique Ross, Assistant Professor in the School of Computing and Information Sciences and STEM Transformation Institute at Florida International University, designs research focused on broadening par- ticipation in computer science through the exploration of: 1) race, gender, and disciplinary identity; 2) discipline-based education research (with a focus on computer science and computer engineering courses) in order to inform pedagogical practices that garner interest and retain women (specifically Black and His- panic women) in computer-related engineering fields. American c Society for Engineering Education, 2021