Asee peer logo
Displaying results 1 - 30 of 63 in total
Conference Session
Computing and Information Technology Division Technical Session 8
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Afsaneh Minaie, Utah Valley University; Reza Sanati-Mehrizy, Utah Valley University; Brandon David Wright, University of Utah
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
. American c Society for Engineering Education, 2021 Game Design in Computer Engineering Capstone ProjectsAbstractThe purpose of a capstone design project course is to provide graduating senior students theopportunity to demonstrate understanding of the concepts they have learned during their studies.As with many computer science and engineering programs, students of the computer engineeringprogram at Utah Valley University (UVU) conclude their degree programs with a semestercapstone design experience. The intent is for students to utilize competencies developed in thefirst three years of the curriculum in the solution of an embedded design problem.Recently many of our computer engineering
Conference Session
Tools and Techniques
Collection
2018 ASEE Annual Conference & Exposition
Authors
Karen H. Jin, University of New Hampshire; Michael Jonas, University of New Hampshire; Christopher David LeBlanc, University of New Hampshire; Theodore Sean Tavares, University of New Hampshire
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Paper ID #23065Modernizing Capstone Project: External and Internal ApproachesProf. Karen H. Jin, University of New Hampshire Karen H. Jin has been an Assistant Professor of Computer Science in Computing Technology program at UNH Manchester since Spring 2016. She previously taught as a lecturer for over ten years in University of Windsor and Dalhousie University. Her interest in computer science education research focuses on devel- oping new empirically supported theories and practices in teaching programming, software engineering and project-based learning with industrial relevance. She received her Ph.D. and M.Sc. in
Conference Session
Computing and Information Technology Division Technical Session 2
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Alyssa Mendlein, Temple University; Thuy-Trinh Nguyen, Temple University ; Aunshul Rege, Temple University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
University. She earned a Bachelor of Arts in Criminology, Law, and Society from the University of California, Irvine and a Master of Science from the California State University, Long Beach in Criminology and Criminal Justice. She is currently working on the NSF CAREER grant for Dr. Aunshul Rege, exploring adversarial decision-making and cybersecurity education innovation.Dr. Aunshul Rege, Temple University Dr. Rege is an Associate Professor with the Department of Criminal Justice at Temple University. Her National Science Foundation sponsored research projects address critical infrastructure and proactive cy- bersecurity, cyberadversarial decision-making and adaptations across intrusion chains, cyber and cyber
Conference Session
Computing and Information Technology Division Technical Session 1
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Franz J. Kurfess, California Polytechnic State University, San Luis Obispo; Maria Pantoja, California Polytechnic State University, San Luis Obispo; Irene Humer, California Polytechnic State University, San Luis Obispo
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Paper ID #29143Deep Learning and Artificial Intelligence: Project Collaboration acrossClassesProf. Franz J Kurfess, California Polytechnic State University, San Luis Obispo Franz J. Kurfess is a professor in the Computer Science and Software Engineering Department, California Polytechnic State University, San Luis Obispo, where he teaches mostly courses in Artificial Intelligence, Human-Computer Interaction, and User-Centered Design. Before joining Cal Poly, he was with Con- cordia University in Montreal, Canada, the New Jersey Institute of Technology, the University of Ulm, Germany, the International Computer Science
Conference Session
Computing & Information Technology: Curriculum and Assessment
Collection
2018 ASEE Annual Conference & Exposition
Authors
Masoud Naghedolfeizi, Fort Valley State University; Xiangyan Zeng, Fort Valley State University; Chunhua Dong, Fort Valley State University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
programming assignment/project, implementing peer-to-peertutoring/mentoring, and engaging students in interdisciplinary/multidisciplinaryundergraduate research activities.This project is currently work in progress and expected to have a positive impact on thecurriculum of computer science program and all of its students from freshman to seniorlevel. We anticipate that the project will enhance the curriculum of at least 15 CS(including 12 upper level division) courses, increase the passing rate of students in gatekeeping courses by 30% or more and the graduation rate of normal completion time by atleast 40%, and improve the performance of senior students in programming subjects ofExit Exam by at least 50%. The project could also serve as a model for
Conference Session
Wireless Technology
Collection
2019 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Reza Sanati-Mehrizy, Utah Valley University; Kyle Joseph Wheelhouse, Utah Valley University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
temperature,light, and vibration.Educational excellence requires exposing students to the current edge of research. To ensure thatstudent projects are along the same trajectory that the industry is moving, educators mustcontinually introduce emerging techniques, practices, and applications into the curriculum. Thefield of wireless sensor networks is growing rapidly, and there is increasing interest in providingundergraduate students with a foundation in the area. It is crucial that the emerging field ofwireless sensor networks be integrated into the undergraduate computer science and engineeringcurricula. This paper presents the details of two WSN projects that our undergraduate computerengineering students have done in their senior capstone
Conference Session
Computing and Information Technology Division Technical Session 4
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Afsaneh Minaie, Utah Valley University; Reza Sanati-Mehrizy, Utah Valley University; Benjamin Chambers
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
for Engineering Education, 2020 Autonomous Vehicles in Computer Engineering ProgramAbstractThe area of autonomous vehicles design has undergone tremendous growth in recent years. Amajor contributor of this growth has been the advances in sensor design, computationalintelligence, and computer vision. The remarkable growth in autonomous vehicles design hasgiven rise to a demand for engineers with experience in designing and implementing thesesystems. Automotive companies are focusing significant research and development efforts onthese systems. They are recognizing the need for a large, well-trained workforce that canconduct these research and development projects. Autonomous vehicle
Conference Session
Computing and Information Technology Division Poster Session
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Geraghty Anne Ellis, Georgia Institute of Technology; Nicholas Mulka, Georgia Institute of Technology; Amit Shashikant Jariwala, Georgia Institute of Technology
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
-term investment in a software platform.IntroductionExperiential learning is a relatively modern technique to supplement students’ education by“[developing] a wide range of thinking strategies and perceptual skills which are not called forthby books or lectures” [1]. The benefits of this method have long-term impacts that play a crucialrole in an individual’s professional success. Most ABET-accredited higher-education programsfeature a design course intended to leverage experiential learning by pairing the culmination ofstudents’ knowledge from their undergraduate program with a simulated real-world industryenvironment [2], [3]. There are also several supplemental outlets for continuous project-basedlearning on a larger scale, such as research
Conference Session
Computing and Information Technology Division Technical Session 6
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Matthew A. Verleger (He/His/Him), Embry-Riddle Aeronautical University; Richard S. Stansbury, Embry-Riddle Aeronautical University; Mustafa Ilhan Akbas, Embry-Riddle Aeronautical University; Philip Craiger, Embry-Riddle Aeronautical University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Swarms with Distributed Swarm Control 3. Enhancing Security of Cloud-Connected UAS ServicesStudents were placed onto teams based on their prior course experiences and the projectrequirements. Common resources were provided for all students to train them in conductingresearch. Teams were then tasked with developing a more comprehensive research plan for theirspecific project and carrying out that plan throughout the 2020-2021 academic year.Students completed a pre-survey at the start of the project and a mid-project survey shortly afterthe winter break. The surveys combined project specific skills questions as well as relevantquestions from the Undergraduate Research Student Self-Assessment (URSSA), an NSF-fundedassessment tool to measure
Conference Session
Computing and Information Technology Division Technical Session 3
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Daqing Hou, Clarkson University; Yu Liu, Clarkson University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
ofenrollment and graduation, U.S. institutions will fall short of producing the needed HPCprofessionals [6]. Worse yet, groups largely untapped by this field, women and minorities,make up a significant portion of the nation’s growing talent pool [7], but are extremelyunderrepresented in HPC related disciplines.A Research Experiences for Undergraduates (REU) Site is an important mechanism to combatthe shortage of HPC professionals. The REU program by the U.S. National ScienceFoundation (NSF) supports active research participation by undergraduate students in any ofthe areas of research funded by the NSF. REU projects involve students in meaningful ways inongoing research programs or in research projects specifically designed for the REU program.As one
Conference Session
Topics in Computing
Collection
2019 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Reza Sanati-Mehrizy, Utah Valley University; Janis P. Raje
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Education, 2019 How an NSF S-STEM LEAP Scholarship Program Can Inform a New Engineering ProgramAbstractIn Fall 2014, Utah Valley University was granted a Scholarships in STEM award from theNational Science Foundation. Entitled Strengthening Outcomes for Students in Engineering andComputer Science through Leadership, Engagement, Academic Mentoring, and Preparation(LEAP), the program is now in its fifth and final year. The goal of this project is to increase thegraduation rate for students in Computer Science and Engineering at UVU, an open enrollmentuniversity, and better prepare them for continued education and/or success in the STEMworkforce by providing scholarships to academically talented students with financial need
Conference Session
Computing and Information Technology Division Technical Session 5
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Alireza Kavianpour, DeVry University, Pomona
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
2020.There are some universities offering four years degree in the field of Renewable EnergyEngineering Technology (REET). In this paper author’s experience in teaching courses in REETprogram, typical student senior projects, and job market forecast for this field will be discussed.The assessment data for the REET senior project was analyzed. Several recommendations forimproving student’s outcomes are suggested.1- IntroductionWhy Study Alternative/Renewable Technologies?Alternative energy is referring to sources of energy that replace fuel sources without theundesired consequences. Fossil fuel burning produces pollution. Nuclear power is a commonalternative to fossil fuels however, radiation and the long-term containment cause great concernand
Conference Session
Curriculum and Assessment III
Collection
2019 ASEE Annual Conference & Exposition
Authors
Rosa Maria Castro Fernandes Vasconcelos, University of Minho; Victor F. A. Barros, University of Minho; Luis Alfredo Martins Amaral P.E., University of Minho; Emilia Rodrigues Araújo, University of Minho; Isabel Ramos, University of Minho
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
study cycles in Textitle Engineering and Engi- neering and Industrial Management, in the 1st cycle course of Design and Fashion Marketing, and also in the 2nd cycle courses of Fashion Design and Communication, Textile Chemistry, Advanced Textiles and Design and Marketing. Head research and research member of several R&D projects, has presented as main author or co-author many dozens of scientific journal papers and communications in international conferences. President of the Pedagogical Council of the School of Engineering since 2011 and Vice-Dean of School of EngineeringVictor F. A. Barros, University of Minho Victor F. A. Barros, Ing.-Paed IGIP (ORCID 0000-0002-7318-8257) is Researcher Fellow at Algoritmi
Conference Session
Computing and Information Technology Division Technical Session 7
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Afsaneh Minaie, Utah Valley University; Joshua D. Neeley, Utah Valley University; Nile Edward Brewer; Reza Sanati-Mehrizy, Utah Valley University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
received his M.S. and Ph.D. in Computer Science from the University of Oklahoma, Norman, Oklahoma. His research focuses on diverse areas such as: Database Design, Data Structures, Artificial Intelligence, Robotics, Computer Aided Manufacturing, Data Mining, Data Warehousing, and Machine Learning. American c Society for Engineering Education, 2021 Haptics in AviationAbstractThe purpose of a capstone design project course is to provide graduating senior students theopportunity to demonstrate understanding of the concepts they have learned during their studies.As with many computer science and engineering programs, students of the
Conference Session
Computing Technology Applications-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Vuk Marojevic, Virginia Tech; Antoni Gelonch-Bosch, Universitat Politècnica de Catalunya; Jeffrey Reed, Virginia Tech
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
standards have become a catalyst for technological innovation because of theway standards are defined. Standards become a tool to coordinate efforts of various stakeholderswhile preserving competition. They are necessary to ensure diversity, compatibility and facilitateworldwide commercial deployment and evolution. A company can take benefits of economies ofscale, build or strengthen collaborations, and participate in the standardization process to imposeits technology and grow its business. The potential of standards to spur economy and impactsociety is apparent more than ever in the increasingly globalized world. Standards developed bythe 3rd Generation Partnership Project (3GPP), a consortium of several standard settingorganizations (SSOs) that
Conference Session
Computing and Information Technology Division Technical Session 1
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Elena Filatova, City University of New York; Deborah Hecht, Center for Advanced Study in Education
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Paper ID #33834Using Data Science to Create an Impact on a City Life and to EncourageStudents from Underserved Communities to Get into STEMProf. Elena Filatova, City University of New York Assistant Professor at CUNY, New York City College of Technology, Department of Computer Systems Technology. Director of the Bachelor of Science in Data Science program.Dr. Deborah Hecht, Center for Advanced Study in Education As Director of the Center for Advanced Study in Education, at the CUNY Graduate Center I am involved in a wide range of educational evaluations of funded and local projects. I also mentor graduate students interested
Conference Session
Computing Research I
Collection
2019 ASEE Annual Conference & Exposition
Authors
Chafic Bousaba, Guilford College
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
browsing capabilities via TOR (The Onion Router), LAMP (Linux, Apache, MySQL, PHPor Python or Perl) server, Virtual Private Network (VPN) server, and protected browsing viaproxy service. The main goal of this educational project is to leverage the total holisticintegration of open source hardware and software to provide an affordable and portable solutionthat could be promptly deployed in case of an emergency, as a part of an incident response plan(IRP), or in case it is needed for testing purposes. Implementing this project provides valuablehands-on security experience and best practices in network architecture and configuration.Additional security features, both in hardware and software, were added to the single-boardcomputers to add additional
Conference Session
Topics in Computing and Information Technology-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Farshid Marbouti, San Jose State University; Valerie A. Carr, San Jose State University; Belle Wei, San Jose State University; Morris E. Jones Jr., San Jose State University; Amy Strage
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
aninterdisciplinary team of faculty at San José State University (SJSU). The minor degreecomprises four courses: Python programming, algorithms and data structures, R programming,and culminating projects. The first ACBSS cohort started in Fall 2016 with 32 students, and thesecond cohort in Fall 2017 reached its capacity of 40 students, 62% of whom are female and35% are underrepresented minority students. Considering ACBSS students’ interest in humanbehavior and society, pedagogical approaches using relevant examples and projects have beendeveloped and integrated throughout the program. Preliminary assessments show that studentsappreciated learning programming skills with which to expand their career opportunities whilegaining confidence in studying technical
Conference Session
Computing and Information Technology Division Technical Session 8
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Jorge Crichigno, University of South Carolina; Elias Bou-Harb, University of Texas at San Antonio; Elie Kfoury, University of South Carolina; Jose Gomez, University of South Carolina; Antonio Mangino, University of Texas at San Antonio
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
-organizes university-wide innovative cyber security research, development and training initiatives. He is also an Associate Professor at the department of Information Systems and Cyber Security specializing in operational cyber security and data science as applicable to national security challenges. Previously, he was a senior research scientist at Carnegie Mellon University (CMU) where he contributed to federally-funded projects related to critical infrastructure security and worked closely with the Software Engineering Institute (SEI). He is also a permanent research scientist at the National Cyber Forensic and Training Alliance (NCFTA) of Canada; an international organization which focuses on the investigation of
Conference Session
Computing and Information Technology Division Technical Session 2
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Sin Ming Loo, Boise State University; Liljana Babinkostova
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
team, and Kali Linux. In this paper, we provideexamples on how students’ knowledge of CPS security changes over the course of the program,how students are supported in and out of the classroom towards advancing their knowledge in thisfield. We also highlight the impact that project-based and team coordinated learning can have onincreasing students’ understanding of the fundamentals of CPS security.IntroductionA recent study by Cybersecurity Ventures [1], a respected publisher of cybersecurity content,predicts that 3.5 million cybersecurity jobs around the world will be unfilled by 2021. In the UnitedStates, the demand for professionals with cybersecurity expertise is outpacing all other occupations[2]. These reports, along with many others
Conference Session
Computing and Information Technology Division Technical Session 3
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Margaret Ellis, Virginia Tech; Catherine T. Amelink, Virginia Tech; Stephen H. Edwards, Virginia Tech; Clifford A. Shaffer, Virginia Tech
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Leadership and Policy Studies at Virginia Tech.Prof. Stephen H Edwards, Virginia Tech Stephen H. Edwards is a Professor and the Associate Department Head for Undergraduate Studies in the Department of Computer Science at Virginia Tech, where he has been teaching since 1996. He received his B.S. in electrical engineering from Caltech, and M.S. and Ph.D. degrees in computer and informa- tion science from The Ohio State University. His research interests include computer science education, software testing, software engineering, and programming languages. He is the project lead for Web-CAT, the most widely used open-source automated grading system in the world. Web-CAT is known for al- lowing instructors to grade students
Conference Session
Computing and Information Technology Division Technical Session 5
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Shinelle Hutchinson, Purdue University, West Lafayette; Yung Han Yoon, Purdue University, West Lafayette; Neesha Shantaram; Umit Karabiyik, Purdue University, West Lafayette
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
smart home hub devices to provide added security protections or intrusionprevention functionality. This smart home lab can also facilitate the creation of assignments fordifferent courses at Purdue University. For example, we can execute various scenarios using thedevices in our lab, create forensic images of control devices and assign these images to students toperform forensic analyses to determine various events. We describe four possible threat scenariosbelow.One case study of a potential threat vector and how students could engage with it using an activelearning project is the investigation of the smart plug device. Using the IoT lab, students would beable to investigate what security measures exist to protect smart plugs from potential
Conference Session
Curriculum and Assessment I
Collection
2019 ASEE Annual Conference & Exposition
Authors
Reza Sanati-Mehrizy, Utah Valley University; Kailee Parkinson, Utah Valley University; Elham Vaziripour, Utah Valley University; Afsaneh Minaie, Utah Valley University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Programming [10] Mining Programming, Projects, Reasonable Analytical written programming homework background, Discrete problems, Midterm Math and Calculus and Final, Final Project, Open note/open book exams Columbia University Machine Learning
Conference Session
Computing and Information Technology Division Technical Session 8
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Zhijiang Dong, Middle Tennessee State University; Joshua Lee Phillips, Middle Tennessee State University; Eric Oslund, Middle Tennessee State University; Chrisila Pettey, Middle Tennessee State University; Catherine E. Brawner, Research Triangle Educational Consultants
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
paper willdescribe the program elements and explain the effects of these activities on our students withpreliminary outcome data and formative evaluation results about the program.1 IntroductionAccording to the 2020 report "STEM and the American Workforce" [1], STEM supports 67% ofU.S. jobs and 69% of the Nation's GDP. Computer occupations play a critical role in STEM.The U.S. Bureau of Labor Statistics projected that about 600,000 or 67% of all new jobs inSTEM between 2018 and 2028 would be in computing. Average annual openings in computeroccupations during the decade were projected to be about 450,000 [2]. Although the number ofstudents who graduated with a bachelor's degree in computer and information sciences in 2016was more than 70,000
Conference Session
Computing and Information Technology Division Technical Session 4
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Stephany Coffman-Wolph, Ohio Northern University; Kimberlyn Gray, West Virginia University Institute of Technology
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
by AI by studying software agents, problem solving bysearching, various ways to represent knowledge, and methods of learning. Additionally, thiscourse will discuss both the ethics and risks associated with the fields of AI. Topics coveredduring the course fall into 4 major categories: (1) Knowledge, Reasoning, Planning, andUncertain Knowledge, (2) Learning and Philosophical Foundations, (3) Communicating,Perceiving, and Acting, and (4) Ethics and Risks. Previously, the authors have used the “flipped”classroom concept in courses. The flipped classroom, when mastered and done well, has beendemonstrated to be beneficial to the students’ ability to learn material [1]. One of the goals forthis project is for students to help create a repository
Conference Session
Topics in Computing
Collection
2019 ASEE Annual Conference & Exposition
Authors
Alka R. Harriger, Purdue University; Suyash Agrawal, Purdue University; Arjun Shakdher, Purdue University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Paper ID #25423Work in Progress: A Web-Based Tool to Assess Computational ThinkingProf. Alka R. Harriger, Purdue University Alka Harriger joined the faculty of the Computer and Information Technology Department (CIT) in 1982 and is currently a Professor of CIT. For the majority of that time, she taught software development courses. From 2008-2014, she led the NSF-ITEST funded SPIRIT (Surprising Possibilities Imagined and Real- ized through Information Technology) project. From 2013-2018, she co-led with Prof. Brad Harriger the NSF-ITEST funded TECHFIT (Teaching Engineering Concepts to Harness Future Innovators and
Conference Session
Computing and Information Technology Division Technical Session 5
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Anastasia Kurdia, Tulane University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
courses complementing the primary major, and atwo-semester capstone project course; 10 courses worth 30 credit hours in total.Figure 1: Program outline. Shaded courses form a required core. Arrows to electives are notdrawn, different core courses are prerequisites for different electives.2.2 Core coursesThe goal of the core courses is to develop fundamental knowledge and skills. All core courseshave non-credit weekly labs associated with them.2.2.1 Introduction to Computer Science IIntroduction to Computer Science I (Intro I) course is designed for students with no priorbackground in computing. It has two central aims. The first aim is to enable the students todevelop computational solutions to practical problems: • Break a
Conference Session
Topics in Computing and Information Technology-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Arshia Khan, University of Minnesota, Duluth
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
problems. We also learned from the literature that women prefer to be more social and interact and work well in Figure 2. Total DFW of CS1511 (Men vs Women) teams. This project is based on these findings and attempts to develop a new approach grounded in research-based pedagogy. This new pedagogy involves two interventions to the traditional classroom teaching style- one, it replaces all the problems in the
Conference Session
Computing Technology Applications-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Laura Kay Dillon, Michigan State University; Michelle Slattery, Peak Research
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
recently, as Vice Chair of ACM SIGSOFT and General Chair of the 38th International Conference on Software Engineering. She has participated in many CRAW and ACM mentoring events; is a founding adviser of MSU Women in Computing, the MSU ACM-W Chapter; and co-led TechKobwa, a technology camp for secondary-school teachers and female students in Rwanda, for three summers. She was awarded the ACM SIGSOFT Distinguished Service Award in 2017.Ms. Michelle Slattery, Peak Research Michelle Slattery has more than 30 years’ experience as a professional evaluator working with diverse clients on complex project evaluations. Her business, Peak Research LLC, is celebrating 25 years of providing services to evaluate S-STEM, BPC, RED
Conference Session
Computing and Information Technology Division Technical Session 2
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Ida B. Ngambeki, Purdue University, West Lafayette; Marcus Rogers, Purdue University, West Lafayette; Sienna Jasmine Bates, Purdue University, West Lafayette; Megan Celeste Piper
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
so the organization may effectively conduct cybersecurity work Strategic planning and policy Executive cyber leadership Program/project management and acquisition Protect and Defend Identifies, analyzes, and mitigates threats Cyber defense analysis to internal information technology (IT) Cyber defense infrastructure support systems and/or networks Incident response