Asee peer logo
Displaying all 12 results
Conference Session
Computing and Information Technology Division Technical Session 3
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Margaret Ellis, Virginia Tech; Catherine T. Amelink, Virginia Tech; Stephen H. Edwards, Virginia Tech; Clifford A. Shaffer, Virginia Tech
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
ConclusionThe course uses a variety of problem-solving strategies and encourages practice, exploration, andtinkering to increase students’ comfort not only with their technical skills but also with theirability to acquire new skills. Students can thus approach future coursework, research, andinternships with some introductory experience with version control, security, command line tools,web development, and user-centered design. The course is significantly composed of classworkactivities so that students are highly engaged and regularly expected to work with their peers.Furthermore, this course could be a gateway for students to engage in more computing experienceoutside of their college coursework: hackathons, online coding challenges, computing clubs
Conference Session
Computing and Information Technology Division Technical Session 6
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Ciprian Popoviciu, East Carolina University; Philip J. Lunsford II, East Carolina University; John Pickard, East Carolina University; Colby Lee Sawyer, East Carolina University; Jarvis Woodburn; Zachary Ryan Zynda, East Carolina University; Dale Drummond, East Carolina University
Tagged Divisions
Computing and Information Technology
managementcan become a challenge when issues occur. On one hand, current IT organizations are not well equippedto manage service overlays such as SaaS based solutions. On the other hand, SaaS based deliveryrelies on the good functioning of multiple management domains without cross domain visibility.In this paper we detail the work of designing and implementing a management platform for a conferencingservice launched by East Carolina University and distributed over multiple admin domains. The projectoffered a collaboration opportunity between students, graduate and undergraduate, from two distinctdepartments: Information and Computer Technology [1], and Computer Science [2]. The task assigned tothe team was to deploy a monitoring solution enabling
Conference Session
Computing and Information Technology Division Technical Session 1
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
James K. Nelson Jr. P.E., Texas A&M University; Brent L. Donham, Texas A&M University-Commerce
Tagged Divisions
Computing and Information Technology
member of the American Society for Engineering Education and the SAFE Association. Prior to receiving his Ph.D. in 1983, Dr. Nelson worked as a design engineer in industry and taught as an adjunct professor at the University of Houston and Texas A&M University at Galveston. In industry he was primarily involved in design of floating and fixed structures for the offshore petroleum industry. After receiving his Ph.D., Dr. Nelson joined the civil engineering faculty at Texas A&M University. He joined the civil engineering faculty at Clemson University in 1989 as Program Director and founder of the Clemson University Graduate Engineering Programs at The Citadel and became Chair of Civil Engineering in 1998. In
Conference Session
Computing and Information Technology Division Technical Session 9
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Wendi M. Kappers, Embry-Riddle Aeronautical University, Daytona Beach; Martha Nanette Harrell, Arkansas Tech University
Tagged Divisions
Computing and Information Technology
, Karanjaindicated, was a possible issue with the development of information security best practices. If theCOO fails to understand or is not aware of security issues, the proper resources may not beallocated to the security of the information assets. CIO reporting is also a concern. By ensuringthe CIO reports to the CEO, the CEO is more likely to be provided a clear picture of thealignment of the technical and business aspects of the organization but miss security concerns.As mentioned, CEOs are concerned with the overall success of the organization and must rely onthe other C-Suite staff for input to assist with organization decisions. Conflict, then,can occurwhen security governance and corporate governance do not align. As continued adoption of
Conference Session
Computing and Information Technology Division Technical Session 5
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Shinelle Hutchinson, Purdue University, West Lafayette; Yung Han Yoon, Purdue University, West Lafayette; Neesha Shantaram; Umit Karabiyik, Purdue University, West Lafayette
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
have been incorporated into all facets of life, from the medicalindustry to transportation and it has even made its way into our homes. These devices have accessto vast amounts of data, especially personal data. However, due to the compact nature of thesedevices, insufficient effort has been made to incorporate security into their design. With that inmind, IoT devices are treasure-troves of potential evidentiary data for forensic investigators,especially when these devices are used to aid in criminal activities. Concerning IoT devices, thereis a need to investigate these devices to find answers to questions such as, what data can berecovered from these devices along with their respective smartphone applications? What methodswould be best
Conference Session
Computing and Information Technology Division Technical Session 2
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Sin Ming Loo, Boise State University; Liljana Babinkostova
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
two offerings of the course were students fromComputer Science, Electrical Engineering, and Mechanical Engineering while the program is alsoopen to students from Civil Engineering and Mathematics. The curriculum was structured whereall credit hours earned contribute to their graduation requirements. The introductory course is anelective course. The objective is not for students to be security experts, rather it is about knowingenough to understand cyber threat impacts to the system design process, understand how to protectagainst such threats, and be able to know when to call the cybersecurity experts. Although thereare many degree programs in cybersecurity as a major and research in cyber physical systemrelated to smart infrastructure &
Conference Session
Computing and Information Technology Division Technical Session 2
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Tamer Omar, California State Polytechnic University, Pomona; Abdelfattah Amamra, California State Polytechnic University, Pomona; Kristina Rigden, California State Polytechnic University, Pomona; Thomas Ketseoglou, California State Polytechnic University, Pomona
Tagged Divisions
Computing and Information Technology
Research Education: A Report on the First Year of a NSF-sponsored Cyber-physical System Cybersecurity Research Experience for Undergraduates Program," in ASEE Annual Conference & Exposition , Tampa, Florida, 2019.[15] N. V. Ivankova, J. W. Creswell and S. L. Stick, "Using Mixed-Methods Sequential Explanatory Design: From Theory to Practice," Field Methods, vol. 18, no. 1, p. 3–20, 2006.[16] S. R. Terrell, "Mixed-methods research methodologies," The Qualitative Report, 2012.[17] J. W. Creswell, Research Design.: Qualitative, Quantitative, Mixed Methods Approaches, University of Nebraska-Lincoln, 2016.[18] O. M. Mugenda, Research methods: Quantitative and qualitative approaches, African Centre for Technology Studies, 1999.
Conference Session
Computing and Information Technology Division Technical Session 6
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Natasha Smith P.E., University of Virginia
Tagged Divisions
Computing and Information Technology
homework, with quickfeedback. A final hurdle was that this was the author’s first time teaching Vibrations. Therefore,it was necessary to prioritize lesson plan preparation over delivery logistics. This precluded timeintensive efforts such as learning complicated software or prerecording lectures in an instructionallab environment.Mastery learning (or learner-centric) techniques introduced by Bloom in the 1970s and expandedby researchers over the last half century have an established track record for enhancing studentlearning.1–3 In particular, periodic formative assignments are necessary and should be designed sothat students reflect on mistakes and adjust their learning efforts as needed. Within the Vibrationscourse, the mechanisms for formative
Conference Session
Computing and Information Technology Division Technical Session 8
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Jorge Crichigno, University of South Carolina; Elias Bou-Harb, University of Texas at San Antonio; Elie Kfoury, University of South Carolina; Jose Gomez, University of South Carolina; Antonio Mangino, University of Texas at San Antonio
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
cyber-crimes impacting citizens and businesses. Dr. Bou-Harb holds a Ph.D. degree in computer science from Concordia University in Montreal, Canada, which was executed in collaboration with Public Safety Canada, Industry Canada and NCFTA Canada. His research and development activities and interests focus on operational cyber security, attacks’ detection and char- acterization, malware investigation, cyber security for critical infrastructure and big data analytics. Dr. Bou-Harb has authored more than 80 refereed publications in leading security and data science venues, has acquired state and federal cyber security research grants valued at more than $4M, and is the recipient of 5 best research paper awards, including
Conference Session
Computing and Information Technology Division Technical Session 1
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Mia Minnes, University of California, San Diego; Sheena Ghanbari Serslev, University of California, San Diego ; Madison Edwards
Tagged Divisions
Computing and Information Technology
lack that would prevent them from being hired? Radermacher et al. [18] documented hurdlesfacing recent graduates. They write that the greatest challenges for recent graduates involve effectivelycommunicating with customers and coworkers, using software tools and configuration managementsystems, and creating unit tests for code. Also, the most common issues preventing students fromobtaining a position at a company were a lack of problem-solving abilities and project experience. EricBrechner, Director of Microsoft Development Training, voices similar concerns about the inadequatepreparation of CSE college graduates transitioning to full-time positions and cites the following as areasof needed preparation: software design and analysis; writing
Conference Session
Computing and Information Technology Division Technical Session 7
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Radana Dvorak, University of Portland; Heather Dillon, University of Portland; Nicole Ralston, University of Portland; Jeffrey Matthew Welch, University of Portland
Tagged Divisions
Computing and Information Technology
, Heather Dillon worked for the Pacific Northwest National Laboratory (PNNL) as a senior research engineer.Dr. Nicole Ralston Dr. Nicole Ralston is an Assistant Professor and co-Director of the Multnomah County Partnership for Education Research (MCPER) in the School of Education at the University of Portland in Portland, Ore- gon. She received her Ph.D. in Educational Psychology with an emphasis in Measurement, Statistics, and Research Design from the University of Washington. An elementary school teacher at heart, she now teaches educational research and STEM methods to undergraduate and graduate students. Her research fo- cus involves bringing active learning strategies to STEM, best practices of research-practice
Conference Session
Computing and Information Technology Division Technical Session 4
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Lina Battestilli, North Carolina State University; Sarah Korkes, North Carolina State University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
. She worked on the PowerEN Technology, a blur between general purpose and networking processors and hardware accelerators. She identified and studied workloads at the edge of the network that required high-throughput and fast deep-packet processing. Since 2012, her research has been focused on Computer Science Education, especially in the area of peer collaboration, scaling techniques for large courses, auto-graders and learning analytics. She is also working on software that can be used for teaching and learning. She is investigating techniques and best practices on broadening participation in Computer Science. Women and minorities need to be more involved in tech innovation as companies and teams perform