Asee peer logo
Displaying all 3 results
Conference Session
Curriculum and Assessment I
Collection
2019 ASEE Annual Conference & Exposition
Authors
Reza Sanati-Mehrizy, Utah Valley University; Kailee Parkinson, Utah Valley University; Elham Vaziripour, Utah Valley University; Afsaneh Minaie, Utah Valley University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Sciencedegree. Also, there are many online teaching platforms dedicated to this subject. However, there is noclear consensus on what knowledge students need in order to be able to accomplish the tasks thatemployers are expecting. We are in the process of developing a comprehensive curriculum tailored toteaching students the necessary Data Mining theory and skills in our institution.Our proposed curriculum is influenced by data gathered from syllabi of courses taught in the area of DataMining at different institutions of higher education across the United States. Each syllabus was used togather information for the topics taught in the class, the textbook and reading materials, the primarylanguage used to teach students the concepts, and the frequency of
Conference Session
Curriculum and Assessment I
Collection
2019 ASEE Annual Conference & Exposition
Authors
Karen C. Davis, Miami University
Tagged Divisions
Computing and Information Technology
, the preparatory work consists of reading thetextbook, watching (and in an upper level course, critiquing) videos, executing provided codesamples, and taking online quizzes. Students consistently reported above average learningboth from experiences outside of the classroom and during class compared to previous courses.Some students commented that they felt that they were graded on material that was “notcovered then lectured after” (Maher et al., 2015). The authors conclude that while thepreparatory work makes the in-class work more meaningful, it is important to communicate thepurpose and benefits of the style of instruction.Peer instruction is an active learning methodology originally deployed in physics (Crouch et al.,2007) that has been
Conference Session
Cyber Technology
Collection
2019 ASEE Annual Conference & Exposition
Authors
Kristen Przyborski, University of New Haven; Frank Breitinger, University of New Haven; Lauren Beck, University of New Haven; Ronald S. Harichandran, University of New Haven
Tagged Divisions
Computing and Information Technology
unprecedented connectivity andconvenience, it also has the potential to expose them to a variety of threats and manipulations.Internet security on college campuses has become a primary concern of those tasked withprotecting campus networks. We developed a “Cyber World” version of our team-taught first-yearexperience course at the University of New Haven with the intent of introducing students toimportant cybersecurity concepts. In comparison with other topics taught during the samesemester, students reported a greater level of knowledge in topics of identity theft, safe practicesfor online transactions, fake news, and information oversharing. A pilot online module related tolectures and class activities was well received and supports the increased use