Asee peer logo
Displaying all 17 results
Conference Session
Computing and Information Technology Division Technical Session 2
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Ida B. Ngambeki, Purdue University, West Lafayette; Marcus Rogers, Purdue University, West Lafayette; Sienna Jasmine Bates, Purdue University, West Lafayette; Megan Celeste Piper
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
interest include: STEM Education, Cybersecurity Education, Cybersecurity Policy, Social Engineering, Information Technology Ethics, and Cybersecurity Workforce Development.Dr. Marcus Rogers, Purdue University, West Lafayette Dr. Marcus Rogers, is a Professor and Executive Director of Cybersecurity Programs in the Dept. of Computer & Information Technology, Purdue University. He is the Chief Scientist at the Purdue Tippeca- noe High Tech Crime Unit (HTCU), and the Editor-in-Chief Journal of Digital Forensics Security & Law (JDFSL). Dr. Rogers also sits on the Board of Directors American Academy of Forensic Sciences (AAFS). Dr. Rogers’ research and publications focus on cybercrime, cyber-criminal behavioral
Conference Session
Computing and Information Technology Division Technical Session 4
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Stephany Coffman-Wolph, Ohio Northern University; Kimberlyn Gray, West Virginia University Institute of Technology
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
by AI by studying software agents, problem solving bysearching, various ways to represent knowledge, and methods of learning. Additionally, thiscourse will discuss both the ethics and risks associated with the fields of AI. Topics coveredduring the course fall into 4 major categories: (1) Knowledge, Reasoning, Planning, andUncertain Knowledge, (2) Learning and Philosophical Foundations, (3) Communicating,Perceiving, and Acting, and (4) Ethics and Risks. Previously, the authors have used the “flipped”classroom concept in courses. The flipped classroom, when mastered and done well, has beendemonstrated to be beneficial to the students’ ability to learn material [1]. One of the goals forthis project is for students to help create a repository
Conference Session
Computing and Information Technology Division Technical Session 2
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Alyssa Mendlein, Temple University; Thuy-Trinh Nguyen, Temple University ; Aunshul Rege, Temple University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Science, Technology, Engineering, and Math (STEM)fields, which this paper details. The next section provides more background on OSINT and itsuse by cyber criminals, governments, local law enforcement, and private corporations. Section 3details the OSINT course activity, such as the project description, objectives, classdemographics, logistics and scope, and student deliverables. The fourth section incorporatesstudent responses to the project, including general feelings about the project, how it relates tocybersecurity, strategies for completing the project, and how they managed challenges faced inthe process. Section 5 is an overview of lessons learned by the educator, including how todevelop an ethical project on this topic, create instructions
Conference Session
Computing and Information Technology Division Technical Session 1
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Irini Spyridakis, University of Washington
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Paper ID #34894Cross-cultural User Interface Design in a Global Marketplace: BuildingAppreciation for Diversity, Equity, and InclusionMs. Irini Spyridakis, University of Washington Irini Spyridakis is an Assistant Teaching Professor in the Department of Human Centered Design & En- gineering at the University of Washington. Her research and teaching concern ethics and sustainable design in engineering, human computer interaction, smart cities, resource constrained communities, tech- nology for social good, and STEM outreach. She has close to 20 years of teaching experience and is an experienced UX researcher and designer
Conference Session
Computing and Information Technology Division Technical Session 5
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Bin Cong, California State University at Fullerton; Christopher Ryu, California State University at Fullerton; Raman Menon Unnikrishnan, California State University at Fullerton
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
spiral, waterfall and agile. (Process) FDBK Demonstrate ability to make improvements after receiving constructive feedback. (Feedback) ETH Demonstrate an understanding of professional ethics appropriate to the use or development of computer science artifacts, and social impact of computer technology. (Ethics) ISPEC Demonstrate an understanding of intellectual property laws and ethics, software licenses, and commensurate rights. Demonstrate an understanding of security, privacy, and other ethical or legal issues, that arise in the context of computing. (Intellectual Property and Security) WRITE Write a clear document which meets the needs of the intended reader(s). (Writing) SPEAK
Conference Session
Computing and Information Technology Division Poster Session
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
M Abdullah Canbaz, Indiana University Kokomo; KeeJoh OHearon; Michael McKee, Indiana University Kokomo; Md Nour Hossain
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
,devices including development, deployment, security, surpassing 75 billion devices by 2025 [2]. A largeprivacy, and ethics. For every new device, a set of portion of these connected devices is in the categoryprocedures and algorithms need to be developed to of the IoT devices designed to ease people’s dailyenable them to connect, interact, monitor, analyze, lives. With the overwhelming presence of IoT in ourand augment the device’s physical attributes. Given lives, from smart appliances to industrial IoTs, there isthat the data generated and processed by the IoT drastic concern surrounding IoT device securitydevices contain a large amount of private information
Conference Session
Computing and Information Technology Division Technical Session 5
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Alireza Kavianpour, DeVry University, Pomona
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
project dataBy analyzing the assessment data, it seems students in the senior project have weaknesses inthree major areas: Design, Mathematical modelling, EthicsTo improve design, mathematical modelling, and calculation, suggestion is to have one of themajor weekly assignment be an Engineering Logbook. Every week students should submit theirdesign, and calculation. For example, if students use SONAR in their project, in the engineeringlogbook they must write all calculations and how to measure distance or in the case of motorconnection to micro-controller they must write in the logbook all calculations for the requiredcurrent. Regarding ethics, in the course shell one module should be covered the engineeringethics specially IEEE Engineering
Conference Session
Computing & Information Technology: Curriculum and Assessment
Collection
2018 ASEE Annual Conference & Exposition
Authors
Michael Oudshoorn, Northwest Missouri State University; Rajendra K. Raj, Rochester Institute of Technology; Stan Thomas, Wake Forest University; Allen Parrish, United States Naval Academy
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
sufficient cachet that accreditation is not necessary. This may be true; who would not hirea Stanford University graduate simply because the computer science program at Stanford Univer-sity is not accredited by ABET? At the same time, conforming to accreditation standards and peerreview would have helped Stanford or University of Texas avoid headlines that revealed that theircomputer science students have been graduating without taking course work in ethics, somethingABET accreditation standards have required for decades 7 . In contrast, several high-profile andprestigious programs such as MIT are accredited. In this case, presumably, the program or theinstitution has seen value in the accreditation process, or even perhaps to signal to lesser
Conference Session
Computing and Information Technology Division Technical Session 3
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Margaret Ellis, Virginia Tech; Catherine T. Amelink, Virginia Tech; Stephen H. Edwards, Virginia Tech; Clifford A. Shaffer, Virginia Tech
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
. Nextwe incorporate sklearn 40 so students can execute and explore the results of machine learningalgorithms. To prepare for machine learning content students watch bots videos 14 and they arealso assigned some ethics reflection prompts in response to Cathy O’Neil’s TED Talk 35 .The common thread across topics is the problem-solving heuristics shown in Figure 1. Weintroduce these early on and revisit them with each topic and explicitly point out when we areusing a strategy, or trying several of them, to solve a problem. For example we point out the useof concrete examples for solving encoding problems, developing algorithms, and initially usinghard-coded values in incremental web development. Another example is how students areexposed to
Conference Session
Computing and Information Technology Division Poster Session
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Erica Haugtvedt, South Dakota School of Mines and Technology; Duane L. Abata, South Dakota School of Mines and Technology
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
].This C++ program, presented in the appendix, can be a useful assignment to both beginning andadvanced students in engineering and computer science for developing programming skills andalso conveying the historical significance of Lovelace’s work. This interdisciplinary exercisewould promote interdisciplinary competence and knowledge transfer between science andengineering and the humanities, emphasizing the human aspects of the history of science.Lattuca et. al. observed that engineers “need the strong analytical skills fundamental toengineering practice, but also a number of other attributes, such as creativity; skills incommunication, management, and leadership; high ethical standards and professionalism;agility, resilience, and flexibility
Conference Session
Computing and Information Technology Division Technical Session 6
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Matthew A. Verleger (He/His/Him), Embry-Riddle Aeronautical University; Richard S. Stansbury, Embry-Riddle Aeronautical University; Mustafa Ilhan Akbas, Embry-Riddle Aeronautical University; Philip Craiger, Embry-Riddle Aeronautical University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
. Philip started his academic career as an Associate Professor in the Department of Computer Science at the University of Nebraska at Omaha. He is a member of the American Academy of Forensic Sciences, and holds numerous professional certifications, including Certified Information Systems Security Practi- tioner (CISSP), and a Certified Cyber Forensics Practitioner (CCFP) from (ISC)2, SANS GIAC Computer Forensics Analyst, and an EC-Council Certified Ethical Hacker. His research and teaching interests in- clude sUAS cybersecurity, and general aviation cybersecurity. Dr. Craiger is a certified NAUI technical SCUBA instructor and instructor trainer (certifies NAUI instruc- tors). He has hundreds of technical dives
Conference Session
Computing and Information Technology Division Technical Session 4
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Afsaneh Minaie, Utah Valley University; Reza Sanati-Mehrizy, Utah Valley University; Benjamin Chambers
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
automated car, IEEE/RSJ International Conference on Intelligent Robots and Systems, 1507–1512, 1999. 5. Lassa, Todd "The Beginning of the End of Driving". Motor Trend, January 2013. 6. "European Roadmap Smart Systems for Automated Driving", EPoSS, 2015. 7. Lim, Hazel Si Min; Taeihagh, Araz, "Algorithmic Decision-Making in AVs: Understanding Ethical and Technical Concerns for Smart Cities". Sustainability, 11 (20): 5791, 2019. 8. Fayjie, Abdur, et.al., “Driverless Car: Autonomous Driving Using Deep Reinforcement Learning in Urban Environment”, 2018 15th International Conference on Ubiquitous Robots, 2018. 9. Annual Report on the State of Poverty in Utah, 2014, Community Action Partnership of Utah
Conference Session
Computing and Information Technology Division Technical Session 2
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Sin Ming Loo, Boise State University; Liljana Babinkostova
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
topics without in-depth coverage. After taking this course, the students shouldbe able to: • Identify the importance of cyber-physical system security • Understand cryptography and the importance of cryptography in modern society • Develop proficiency using Kali Linux • Learn/demonstrate a PLC ladder logic program • Identify the similarities and differences between IT and OT networks • Understand industrial control system, Shodan, and smart grid • Identify the working of CAN bus • Discuss the ethics of cybersecurity and problems of many hands • Learn/demonstrate penetration test (WiFi, network scan, Nessus, Metasploit, etc) • Understand Risk Assessment and threat modeling • Learn/demonstrate basics of
Conference Session
Curriculum and Assessment I
Collection
2019 ASEE Annual Conference & Exposition
Authors
Reza Sanati-Mehrizy, Utah Valley University; Kailee Parkinson, Utah Valley University; Elham Vaziripour, Utah Valley University; Afsaneh Minaie, Utah Valley University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
associated, Bias/Variance Classification Tree based approaches, Neural Networks, Bayes Classifier, Classification modeling, Discriminative Classifications Ethics Privacy, Security, Data Leaks, Biases, Confidentiality, Societal consequences Error measure Evaluation of Models, Confusion Matrices, ROC Graph Association Rules Association Rule Mining, Patterns in frequent
Conference Session
Computing Technology Applications-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Yun Dai, University of Southern California; Tianmeng Li, University of New South Wales; Ang Liu, University of New South Wales; Stephen Lu, University of Southern California
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
, they are suitable for thecosine similarity algorithm. Lastly, the text-based messages posted by students in their studygroups are analyzed and compared based on the measure of TF-IDF (i.e., term frequency-inverse document frequency). TF-IDF is broadly used by the content-based recommendersystems to compare the similarity between two pieces of textual contents [17-18]. The morefrequently two students use the same set of keywords, the more similar they are considered. Itshould be noted that, in consideration of ethics, the content analysis of group discussions canbe disabled in practice. The instructor is enabled to select whether he/she prefers to place themost similar/different students in the same study group.Figure 7 illustrates the system
Conference Session
Computing Research I
Collection
2019 ASEE Annual Conference & Exposition
Authors
Mohsen Taheri, Florida International University; Monique S. Ross, Florida International University; Zahra Hazari, Florida International University; Mark A Weiss, Florida International University; Michael Georgiopoulos, University of Central Florida; Ken Christensen P.E., University of South Florida; Tiana Solis, Florida International University; Deepa Chari, Florida International University; Zahra Taheri
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Florida-Georgia Louis Stokes Alliance for Minority Participation (FGLSAMP). She is a past adviser of the Women in Computer Science (WICS) student club. From 2008 to 2010, Ms. Solis was a programmer analyst at the Department of the Attorney General in Hawaii, a member of the team revamping the State Juvenile Justice Information System. Her research and instructional Interests include programming languages, computer ethics and student success and development.Dr. Deepa Chari, Florida International UniversityZahra Taheri Zahra Taheri has studied psychology and her interests focus on human development, women and minori- ties in STEM. c American Society for Engineering Education, 2019Exploring
Conference Session
Computing and Information Technology Division Technical Session 4
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Stephanie J. Lunn, Florida International University; Monique S. Ross, Florida International University; Zahra Hazari, Florida International University; Mark A. Weiss, Florida International University; Michael Georgiopoulos, University of Central Florida; Ken Christensen P.E., University of South Florida; Tiana Solis, Florida International University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
research and instructional Interests include programming languages, computer ethics and student success and development. American c Society for Engineering Education, 2021 Uneven Playing Field: Examining Preparation for Technical Interviews in Computing and the Role of Cultural ExperiencesAbstractWhile starting a career may be challenging in any field, in computing the process tends to beaggravated by requirements of digital portfolios and technical interviews that necessitate codingextemporaneously. During the programming components, candidates are expected to offer asolution, while also giving consideration to the choice of algorithm and its time complexity.Although