- Conference Session
- Curriculum and Assessment I
- Collection
- 2019 ASEE Annual Conference & Exposition
- Authors
-
Reza Sanati-Mehrizy, Utah Valley University; Kailee Parkinson, Utah Valley University; Elham Vaziripour, Utah Valley University; Afsaneh Minaie, Utah Valley University
- Tagged Topics
-
Diversity
- Tagged Divisions
-
Computing and Information Technology
Sciencedegree. Also, there are many online teaching platforms dedicated to this subject. However, there is noclear consensus on what knowledge students need in order to be able to accomplish the tasks thatemployers are expecting. We are in the process of developing a comprehensive curriculum tailored toteaching students the necessary Data Mining theory and skills in our institution.Our proposed curriculum is influenced by data gathered from syllabi of courses taught in the area of DataMining at different institutions of higher education across the United States. Each syllabus was used togather information for the topics taught in the class, the textbook and reading materials, the primarylanguage used to teach students the concepts, and the frequency of
- Conference Session
- Curriculum and Assessment I
- Collection
- 2019 ASEE Annual Conference & Exposition
- Authors
-
Karen C. Davis, Miami University
- Tagged Divisions
-
Computing and Information Technology
, the preparatory work consists of reading thetextbook, watching (and in an upper level course, critiquing) videos, executing provided codesamples, and taking online quizzes. Students consistently reported above average learningboth from experiences outside of the classroom and during class compared to previous courses.Some students commented that they felt that they were graded on material that was “notcovered then lectured after” (Maher et al., 2015). The authors conclude that while thepreparatory work makes the in-class work more meaningful, it is important to communicate thepurpose and benefits of the style of instruction.Peer instruction is an active learning methodology originally deployed in physics (Crouch et al.,2007) that has been
- Conference Session
- Cyber Technology
- Collection
- 2019 ASEE Annual Conference & Exposition
- Authors
-
Kristen Przyborski, University of New Haven; Frank Breitinger, University of New Haven; Lauren Beck, University of New Haven; Ronald S. Harichandran, University of New Haven
- Tagged Divisions
-
Computing and Information Technology
unprecedented connectivity andconvenience, it also has the potential to expose them to a variety of threats and manipulations.Internet security on college campuses has become a primary concern of those tasked withprotecting campus networks. We developed a “Cyber World” version of our team-taught first-yearexperience course at the University of New Haven with the intent of introducing students toimportant cybersecurity concepts. In comparison with other topics taught during the samesemester, students reported a greater level of knowledge in topics of identity theft, safe practicesfor online transactions, fake news, and information oversharing. A pilot online module related tolectures and class activities was well received and supports the increased use