- Conference Session
- Cyber Technology
- Collection
- 2019 ASEE Annual Conference & Exposition
- Authors
-
Kristen Przyborski, University of New Haven; Frank Breitinger, University of New Haven; Lauren Beck, University of New Haven; Ronald S. Harichandran, University of New Haven
- Tagged Divisions
-
Computing and Information Technology
software, and teaching students how to regularlybackup information to the cloud [6]. At Le Moyne College, an interdisciplinary non-majorscourse was offered titled ‘Cybersecurity for Future Presidents.’ This course, like the one atLoyola, taught students technical skills like encryption, decryption, and packet switching[4].The non-majors courses in cybersecurity that have been designed vary greatly in the style andcontent [6]. Some of the topics covered in these courses are similar to ours: computer networks,cryptography, access controls, threats and human factors, forensics, privacy, ethics, and freespeech, and other computer science fundamentals like, digital representation of information, dataencryption, time complexity, packet switching
- Conference Session
- Cyber Technology
- Collection
- 2019 ASEE Annual Conference & Exposition
- Authors
-
Nikunja Swain P.E., South Carolina State University; Biswajit Biswal, South Carolina State University
- Tagged Divisions
-
Computing and Information Technology
these processes successfully exceptSACSCOC and we started offering the curriculum courses from 2015.Laboratory ModulesLaboratory modules are used for teaching, research and outreach, and the design of laboratory modulesreflect these uses. We use two different laboratory settings for our cybersecurity concentration courses –virtual and face-to-face.The virtual laboratory is from the NDG NetLAB+(https://www.netdevgroup.com/content/cybersecurity). This platform provides our students withlaboratory experiences on number of cybersecurity and computer science topics in an onlineenvironment. Our students conduct experiments in NISGTC Security+, NISGTC Network Security,NISGTC Forensics, NISGTC Ethical Hacking, CSSIA CompTIA Security+. This laboratory
- Conference Session
- Curriculum and Assessment III
- Collection
- 2019 ASEE Annual Conference & Exposition
- Authors
-
Seyed Mousavinezhad, Idaho State University; Cheryl Xu, North Carolina State University
- Tagged Divisions
-
Computing and Information Technology
ability to apply knowledge of mathematics, science, and engineering(c) an ability to design a system, component, or process to meet desired needs within realisticconstraints such as economic, environmental, social, political, ethical, health and safety,manufacturability, and sustainability(e) an ability to identify, formulate, and solve engineering problems(k) an ability to use the techniques, skills, and modern engineering tools necessary forengineering practice.Assessment results showed that about 60% of students performed at or above expected level ofachievement. Note that the course contains applications of mathematics, science, andengineering. It also includes design and ability to formulate/solve engineering problems. Finallycourse uses
- Conference Session
- Poster Session
- Collection
- 2019 ASEE Annual Conference & Exposition
- Authors
-
Mark Dempsey, Collin County Community College ; Ann F Beheler, Collin County Community College
- Tagged Divisions
-
Computing and Information Technology
analysis finds,” Press release, November 2, 2018. [Online] Available: https://www.comptia.org/about- us/newsroom/press-releases/2018/11/02/strong-tech-hiring-across-the-u.s.-economy-in- october-comptia-analysis-finds [Accessed January 25, 2019].[7] Software Guild admin, “The Tech Skills Gap,” December 1, 2017. [Online] Available: https://www.thesoftwareguild.com/tech-skills-gap/ [Accessed January 25, 2019].[8] Express Employment Professionals, “Work ethic and attitude trump experience and education; communication is a high priority,” Press release, April 26, 2017. [Online] Available: https://www.expresspros.com/Newsroom/America-Employed/Survey-Results- What-Traits-do-Businesses-Look-for-in-New-Hires.aspx [Accessed January 25, 2019
- Conference Session
- Curriculum and Assessment II
- Collection
- 2019 ASEE Annual Conference & Exposition
- Authors
-
Xiannong Meng, Bucknell University; Jianming Deng, Jinling Institute of Technology and Southeast University
- Tagged Divisions
-
Computing and Information Technology
-technical courses required by the eight Chinese computerscience programs. Chinese universities, similar to the U.S. universities, have a general educationrequirement that are common across majors. Usually these requirements do not include coursessuch as calculus or physics, which are considered as technical courses. These non-technicalgeneral education courses can be divided into two categories. One set of courses appear in almostall schools. For example, all our eight sample universities have a PE (Physical education)requirement and an English requirement. Seven of the eight schools require such courses asPrinciples of Marxism, Contemporary Chinese History, Fundamentals of Moral Ethics and Laws,and Military Theory. The second set of non-technical
- Conference Session
- Curriculum and Assessment I
- Collection
- 2019 ASEE Annual Conference & Exposition
- Authors
-
Reza Sanati-Mehrizy, Utah Valley University; Kailee Parkinson, Utah Valley University; Elham Vaziripour, Utah Valley University; Afsaneh Minaie, Utah Valley University
- Tagged Topics
-
Diversity
- Tagged Divisions
-
Computing and Information Technology
associated, Bias/Variance Classification Tree based approaches, Neural Networks, Bayes Classifier, Classification modeling, Discriminative Classifications Ethics Privacy, Security, Data Leaks, Biases, Confidentiality, Societal consequences Error measure Evaluation of Models, Confusion Matrices, ROC Graph Association Rules Association Rule Mining, Patterns in frequent
- Conference Session
- Computing Research I
- Collection
- 2019 ASEE Annual Conference & Exposition
- Authors
-
Mohsen Taheri, Florida International University; Monique S. Ross, Florida International University; Zahra Hazari, Florida International University; Mark A Weiss, Florida International University; Michael Georgiopoulos, University of Central Florida; Ken Christensen P.E., University of South Florida; Tiana Solis, Florida International University; Deepa Chari, Florida International University; Zahra Taheri
- Tagged Topics
-
Diversity
- Tagged Divisions
-
Computing and Information Technology
Florida-Georgia Louis Stokes Alliance for Minority Participation (FGLSAMP). She is a past adviser of the Women in Computer Science (WICS) student club. From 2008 to 2010, Ms. Solis was a programmer analyst at the Department of the Attorney General in Hawaii, a member of the team revamping the State Juvenile Justice Information System. Her research and instructional Interests include programming languages, computer ethics and student success and development.Dr. Deepa Chari, Florida International UniversityZahra Taheri Zahra Taheri has studied psychology and her interests focus on human development, women and minori- ties in STEM. c American Society for Engineering Education, 2019Exploring