interest include: STEM Education, Cybersecurity Education, Cybersecurity Policy, Social Engineering, Information Technology Ethics, and Cybersecurity Workforce Development.Dr. Marcus Rogers, Purdue University, West Lafayette Dr. Marcus Rogers, is a Professor and Executive Director of Cybersecurity Programs in the Dept. of Computer & Information Technology, Purdue University. He is the Chief Scientist at the Purdue Tippeca- noe High Tech Crime Unit (HTCU), and the Editor-in-Chief Journal of Digital Forensics Security & Law (JDFSL). Dr. Rogers also sits on the Board of Directors American Academy of Forensic Sciences (AAFS). Dr. Rogers’ research and publications focus on cybercrime, cyber-criminal behavioral
by AI by studying software agents, problem solving bysearching, various ways to represent knowledge, and methods of learning. Additionally, thiscourse will discuss both the ethics and risks associated with the fields of AI. Topics coveredduring the course fall into 4 major categories: (1) Knowledge, Reasoning, Planning, andUncertain Knowledge, (2) Learning and Philosophical Foundations, (3) Communicating,Perceiving, and Acting, and (4) Ethics and Risks. Previously, the authors have used the “flipped”classroom concept in courses. The flipped classroom, when mastered and done well, has beendemonstrated to be beneficial to the students’ ability to learn material [1]. One of the goals forthis project is for students to help create a repository
Science, Technology, Engineering, and Math (STEM)fields, which this paper details. The next section provides more background on OSINT and itsuse by cyber criminals, governments, local law enforcement, and private corporations. Section 3details the OSINT course activity, such as the project description, objectives, classdemographics, logistics and scope, and student deliverables. The fourth section incorporatesstudent responses to the project, including general feelings about the project, how it relates tocybersecurity, strategies for completing the project, and how they managed challenges faced inthe process. Section 5 is an overview of lessons learned by the educator, including how todevelop an ethical project on this topic, create instructions
Paper ID #34894Cross-cultural User Interface Design in a Global Marketplace: BuildingAppreciation for Diversity, Equity, and InclusionMs. Irini Spyridakis, University of Washington Irini Spyridakis is an Assistant Teaching Professor in the Department of Human Centered Design & En- gineering at the University of Washington. Her research and teaching concern ethics and sustainable design in engineering, human computer interaction, smart cities, resource constrained communities, tech- nology for social good, and STEM outreach. She has close to 20 years of teaching experience and is an experienced UX researcher and designer
spiral, waterfall and agile. (Process) FDBK Demonstrate ability to make improvements after receiving constructive feedback. (Feedback) ETH Demonstrate an understanding of professional ethics appropriate to the use or development of computer science artifacts, and social impact of computer technology. (Ethics) ISPEC Demonstrate an understanding of intellectual property laws and ethics, software licenses, and commensurate rights. Demonstrate an understanding of security, privacy, and other ethical or legal issues, that arise in the context of computing. (Intellectual Property and Security) WRITE Write a clear document which meets the needs of the intended reader(s). (Writing) SPEAK
,devices including development, deployment, security, surpassing 75 billion devices by 2025 [2]. A largeprivacy, and ethics. For every new device, a set of portion of these connected devices is in the categoryprocedures and algorithms need to be developed to of the IoT devices designed to ease people’s dailyenable them to connect, interact, monitor, analyze, lives. With the overwhelming presence of IoT in ourand augment the device’s physical attributes. Given lives, from smart appliances to industrial IoTs, there isthat the data generated and processed by the IoT drastic concern surrounding IoT device securitydevices contain a large amount of private information
project dataBy analyzing the assessment data, it seems students in the senior project have weaknesses inthree major areas: Design, Mathematical modelling, EthicsTo improve design, mathematical modelling, and calculation, suggestion is to have one of themajor weekly assignment be an Engineering Logbook. Every week students should submit theirdesign, and calculation. For example, if students use SONAR in their project, in the engineeringlogbook they must write all calculations and how to measure distance or in the case of motorconnection to micro-controller they must write in the logbook all calculations for the requiredcurrent. Regarding ethics, in the course shell one module should be covered the engineeringethics specially IEEE Engineering
sufficient cachet that accreditation is not necessary. This may be true; who would not hirea Stanford University graduate simply because the computer science program at Stanford Univer-sity is not accredited by ABET? At the same time, conforming to accreditation standards and peerreview would have helped Stanford or University of Texas avoid headlines that revealed that theircomputer science students have been graduating without taking course work in ethics, somethingABET accreditation standards have required for decades 7 . In contrast, several high-profile andprestigious programs such as MIT are accredited. In this case, presumably, the program or theinstitution has seen value in the accreditation process, or even perhaps to signal to lesser
. Nextwe incorporate sklearn 40 so students can execute and explore the results of machine learningalgorithms. To prepare for machine learning content students watch bots videos 14 and they arealso assigned some ethics reflection prompts in response to Cathy O’Neil’s TED Talk 35 .The common thread across topics is the problem-solving heuristics shown in Figure 1. Weintroduce these early on and revisit them with each topic and explicitly point out when we areusing a strategy, or trying several of them, to solve a problem. For example we point out the useof concrete examples for solving encoding problems, developing algorithms, and initially usinghard-coded values in incremental web development. Another example is how students areexposed to
].This C++ program, presented in the appendix, can be a useful assignment to both beginning andadvanced students in engineering and computer science for developing programming skills andalso conveying the historical significance of Lovelace’s work. This interdisciplinary exercisewould promote interdisciplinary competence and knowledge transfer between science andengineering and the humanities, emphasizing the human aspects of the history of science.Lattuca et. al. observed that engineers “need the strong analytical skills fundamental toengineering practice, but also a number of other attributes, such as creativity; skills incommunication, management, and leadership; high ethical standards and professionalism;agility, resilience, and flexibility
. Philip started his academic career as an Associate Professor in the Department of Computer Science at the University of Nebraska at Omaha. He is a member of the American Academy of Forensic Sciences, and holds numerous professional certifications, including Certified Information Systems Security Practi- tioner (CISSP), and a Certified Cyber Forensics Practitioner (CCFP) from (ISC)2, SANS GIAC Computer Forensics Analyst, and an EC-Council Certified Ethical Hacker. His research and teaching interests in- clude sUAS cybersecurity, and general aviation cybersecurity. Dr. Craiger is a certified NAUI technical SCUBA instructor and instructor trainer (certifies NAUI instruc- tors). He has hundreds of technical dives
automated car, IEEE/RSJ International Conference on Intelligent Robots and Systems, 1507–1512, 1999. 5. Lassa, Todd "The Beginning of the End of Driving". Motor Trend, January 2013. 6. "European Roadmap Smart Systems for Automated Driving", EPoSS, 2015. 7. Lim, Hazel Si Min; Taeihagh, Araz, "Algorithmic Decision-Making in AVs: Understanding Ethical and Technical Concerns for Smart Cities". Sustainability, 11 (20): 5791, 2019. 8. Fayjie, Abdur, et.al., “Driverless Car: Autonomous Driving Using Deep Reinforcement Learning in Urban Environment”, 2018 15th International Conference on Ubiquitous Robots, 2018. 9. Annual Report on the State of Poverty in Utah, 2014, Community Action Partnership of Utah
topics without in-depth coverage. After taking this course, the students shouldbe able to: • Identify the importance of cyber-physical system security • Understand cryptography and the importance of cryptography in modern society • Develop proficiency using Kali Linux • Learn/demonstrate a PLC ladder logic program • Identify the similarities and differences between IT and OT networks • Understand industrial control system, Shodan, and smart grid • Identify the working of CAN bus • Discuss the ethics of cybersecurity and problems of many hands • Learn/demonstrate penetration test (WiFi, network scan, Nessus, Metasploit, etc) • Understand Risk Assessment and threat modeling • Learn/demonstrate basics of
associated, Bias/Variance Classification Tree based approaches, Neural Networks, Bayes Classifier, Classification modeling, Discriminative Classifications Ethics Privacy, Security, Data Leaks, Biases, Confidentiality, Societal consequences Error measure Evaluation of Models, Confusion Matrices, ROC Graph Association Rules Association Rule Mining, Patterns in frequent
, they are suitable for thecosine similarity algorithm. Lastly, the text-based messages posted by students in their studygroups are analyzed and compared based on the measure of TF-IDF (i.e., term frequency-inverse document frequency). TF-IDF is broadly used by the content-based recommendersystems to compare the similarity between two pieces of textual contents [17-18]. The morefrequently two students use the same set of keywords, the more similar they are considered. Itshould be noted that, in consideration of ethics, the content analysis of group discussions canbe disabled in practice. The instructor is enabled to select whether he/she prefers to place themost similar/different students in the same study group.Figure 7 illustrates the system
Florida-Georgia Louis Stokes Alliance for Minority Participation (FGLSAMP). She is a past adviser of the Women in Computer Science (WICS) student club. From 2008 to 2010, Ms. Solis was a programmer analyst at the Department of the Attorney General in Hawaii, a member of the team revamping the State Juvenile Justice Information System. Her research and instructional Interests include programming languages, computer ethics and student success and development.Dr. Deepa Chari, Florida International UniversityZahra Taheri Zahra Taheri has studied psychology and her interests focus on human development, women and minori- ties in STEM. c American Society for Engineering Education, 2019Exploring
research and instructional Interests include programming languages, computer ethics and student success and development. American c Society for Engineering Education, 2021 Uneven Playing Field: Examining Preparation for Technical Interviews in Computing and the Role of Cultural ExperiencesAbstractWhile starting a career may be challenging in any field, in computing the process tends to beaggravated by requirements of digital portfolios and technical interviews that necessitate codingextemporaneously. During the programming components, candidates are expected to offer asolution, while also giving consideration to the choice of algorithm and its time complexity.Although