Asee peer logo
Displaying results 91 - 108 of 108 in total
Conference Session
Computing and Information Technology Division (CIT) Technical Session 8
Collection
2023 ASEE Annual Conference & Exposition
Authors
Jia Zhu, Florida International University; Stephanie Jill Lunn, Florida International University; George D. Ricco, University of Indianapolis
Tagged Divisions
Computing and Information Technology Division (CIT)
theory in three engineering education journals: 1995–2008. Journal of Engineering Education, 100(2):281–303, 2011. [9] PH Collins and S Bilge. Intersectionality. Polity Press, Cambridge (UK), 2016.[10] Kimberl´e Crenshaw. Demarginalizing the intersection of race and sex: A black feminist critique of antidiscrimination doctrine, feminist theory and antiracist politics. U. Chi. Legal F., page 139, 1989.[11] Richard Delgado and Jean Stefancic. Critical race theory: An introduction, 2001.[12] Erin A Cech. The intersectional privilege of white able-bodied heterosexual men in STEM. Science Advances, 8(24):eabo1558, 2022.[13] Sarah L Rodriguez, Charles Lu, and Daisy Ramirez. Creating a conceptual framework for computing identity
Conference Session
Computing and Information Technology Division (CIT) Technical Session 6
Collection
2025 ASEE Annual Conference & Exposition
Authors
Derin Cayir, Florida International University; Mark Allen Weiss, Florida International University; Selcuk Uluagac, Florida International University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology Division (CIT)
smart home networks. In NDSS, 2022. [8] Leonardo Babun, Amit Kumar Sikder, Abbas Acar, and A Selcuk Uluagac. The truth shall set thee free: Enabling practical forensic capabilities in smart environments. In NDSS, 2022. [9] Derin Cayir, Reham Mohamed, Riccardo Lazzeretti, Marco Angelini, Abbas Acar, Mauro Conti, Z Berkay Celik, and Selcuk Uluagac. Speak up, i’m listening: Extracting speech from zero-permission vr sensors. In NDSS, 2025.[10] H. Maenpaa, S. Varjonen, A. Hellas, S. Tarkoma, and T. Mannisto. Assessing iot projects in university education - a framework for problem-based learning. In 2017 IEEE/ACM 39th International Conference on Software Engineering: Software Engineering Education and Training Track (ICSE-SEET
Collection
2025 ASEE Annual Conference & Exposition
Authors
Taylor Mone Smith, University of Texas at Austin; Earl W. Huff Jr., University of Texas at Austin; Hansika Murugu, University of Maryland, College Park
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology Division (CIT)
positive[THE SHIFT TOWARDS INCLUSION AND ACCESSIBILITY] 15social change. This study serves as a model for educators seeking to incorporate accessibility andinclusive design into their curricula, offering insights into structuring courses that combinetheory, practice, and real-world engagement. The outcomes of this course demonstrate theprofound impact of inclusive design education in shaping the next generation of designers andtechnologists, ensuring that accessibility remains at the forefront of innovation and development.[THE SHIFT TOWARDS INCLUSION AND ACCESSIBILITY] 16 ReferencesBarteaux, S. (2014
Conference Session
Computing and Information Technology Division (CIT) Technical Session 3
Collection
2025 ASEE Annual Conference & Exposition
Authors
Roberto Patricio Carú, Universidad Andres Bello; Juan Felipe Calderón, Universidad Andres Bello, Viña del Mar, Chile
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology Division (CIT)
points, with Group 1's average being5.81 and Group 2's being 4.91. This indicates that, on average, Group 1 achieved higher gradesthan Group 2.Applying ANOVA to compare performance (final grade) between Group 1 and Group 2 yieldsan F-statistic value of 116.8963 and a p-value of approximately 7.411684e-13. The p-value isextremely low (much lower than any standard significance threshold, such as 0.05), indicating astatistically significant difference between the two groups' final grades. This suggests thatacademic performance (measured by final grade) significantly differs between Group 1 andGroup 2.Analysis of Students' Work ExperienceBoth groups belong to the evening session, mainly consisting of students working during the day.Additionally
Conference Session
Computing and Information Technology Division (CIT) Technical Session 6
Collection
2023 ASEE Annual Conference & Exposition
Authors
Yumin Zhang, Southeast Missouri State University
Tagged Divisions
Computing and Information Technology Division (CIT)
frames. TheOpcode is input from switches 13-17 on the left side. The binary output value is displayed in thegroup of eight LEDs on the right, while its decimal value is displayed in the three 7-segmentdisplays 0-2 on the right, highlighted with white frames.Conceptual DesignIn terms of CPU design, each operation within the instruction set can be viewed as a separatemodule. The adder is the most frequently utilized component within an ALU, as it is involved innumerous operations. Subtraction can be implemented as addition when the subtrahend isrepresented as a negative number in 2’s complement format. Additionally, integer multiplicationcan be achieved through a combination of left shifting and addition/subtraction. To illustrate thispoint, the
Conference Session
Computing and Information Technology Division (CIT) Technical Session 9
Collection
2023 ASEE Annual Conference & Exposition
Authors
Emil H. Salib, James Madison University
Tagged Divisions
Computing and Information Technology Division (CIT)
freeradius clients(AP/authenticators) to the radius-rasp server. To launch the radius server and test its configura-tions, we exercised the following commands in separate shells: sudo freeradius −X radtest testuser testcheckout localhost 1812 testsecret eapol test −c eapol− ttls .conf −a localhost −p 1812 −s testsecret −r1where the eapol-ttls.conf is given in Appendix A.2.1.wpa-rasp: In support of WPA3-Personal security mode (including SAE and PMF), the wpa-raspwas configured according to the wpa supplicant.conf configuration example given in AppendixA.2.2.To launch the wpa-rasp, we exercised the following command: sudo wpa supplicant −D nl80211 −i wlan1 −c wpa supplicant.conf −dd −Kwhere -D is the driver, -i interface, -c configuration
Conference Session
Computing and Information Technology Division (CIT) Technical Session 3
Collection
2023 ASEE Annual Conference & Exposition
Authors
Mahima Agumbe Suresh, San Jose State University
Tagged Divisions
Computing and Information Technology Division (CIT)
components in one grading bundle withspecifications grading. For the group assessments, the system included an individual contributionscomponent, which would impact the final grade for a student.Overall, the grading load was not higher than the traditional grading system. The author hadfewer conflicts with students and little to no discussions about partial credit. It was a positiveexperience and the author would recommend this system to other Computer Networks courseinstructors.References [1] Alison Clear and Allen S Parrish. Computing curricula 2020. Computing Curricula, 2020. [2] Association for Computing Machinery (ACM) Joint Task Force on Computing Curricula and IEEE Computer Society. Computer Science Curricula 2013: Curriculum Guidelines
Conference Session
Computing and Information Technology Division (CIT) Technical Session 2
Collection
2024 ASEE Annual Conference & Exposition
Authors
SAGNIK NATH, University of California, Santa Cruz
Tagged Divisions
Computing and Information Technology Division (CIT)
. Buckner, "A non-traditonal approach to an assembly language course." Journal of Computing Sciences in Colleges 22.1 (2006): 179-186.[5]Imamura, Kosuke. "Assembly language is more than a teaching tool." Journal of Computing Sciences in Colleges 20, no. 2 (2004): 49-54.[6]Little, R. Rainey, and Mark K. Smotherman. "Assembly language courses in transition." ACM SIGCSE Bulletin 20, no. 1 (1988): 95-99.[7]Chmiel, Ryan, and Michael C. Loui. "Debugging: from novice to expert." ACM SIGCSE Bulletin 36, no. 1 (2004): 17-21.[8]Adolph, Karen E., and Kari S. Kretch. "Gibson’s theory of perceptual learning." International encyclopedia of the social and behavioral sciences 10 (2015): 127-134.[9]Fincher, Sally, Johan Jeuring, Craig S. Miller, Peter
Conference Session
Computing and Information Technology Division (CIT) Technical Session 10
Collection
2025 ASEE Annual Conference & Exposition
Authors
Rajendran Swamidurai, Alabama State University; Uma Kannan, Alabama State University
Tagged Divisions
Computing and Information Technology Division (CIT)
scanning, denial-of-service attacks, SQL injection, cryptography, penetration testing,threat management, identity management, identification and mitigation of security risks, andnetwork access control.Digital Forensics: This course covers topics such as hashing and validations, data erasure, filecarving, file signatures, slack space, string search, regular expressions, forensic discovery,analyzing system times, file system analysis, systems and subversion, deleted file systempersistence, and system processes. This course leveraged topics typically found in ISC2(Association for Inspiring a Safe and Secure Cyber World)’s CHFI (Certified Hacking ForensicsInvestigator).3. ResultsThis result summarizes feedback from student surveys taken in the Spring
Conference Session
Computing and Information Technology Division (CIT) Technical Session 4
Collection
2025 ASEE Annual Conference & Exposition
Authors
Tyler Clark, SageFox Consulting Group ; Rebecca Zarch, SageFox Consulting Group; Mikaela Hurd
Tagged Divisions
Computing and Information Technology Division (CIT)
andprofessional trajectories of CS students.References[1] D. Shah. “By the numbers: MOOCs in 2021.” Class Central. Accessed: Feb. 20, 2025. [Online.] Available: https://www.classcentral.com/report/mooc-stats-2021/[2] L. J. Sax, M. A. Kanny, T. A. Riggers-Piehl, H. Whang, and L. N. Paulson. “‘But I’m not good at math’: The changing salience of mathematical self-concept in shaping women’s and men’s STEM aspirations,” Research in Higher Education, vol. 58, no.7, pp. 763–794, Feb. 2017, doi: 10.1007/s11162-017-9450-6.[3] National Center for Education Statistics, 2020, “Completions,” Integrated Postsecondary Education Data System (IPEDS). [Online]. Available: https://nces.ed.gov/ipeds/use-the-data[4] S. Mithun and X
Conference Session
Computing and Information Technology Division (CIT) Technical Session 9
Collection
2025 ASEE Annual Conference & Exposition
Authors
Omar Ochoa, Embry-Riddle Aeronautical University - Daytona Beach; Radu F. Babiceanu, Western Michigan University; Salamah Salamah, University of Texas at El Paso
Tagged Divisions
Computing and Information Technology Division (CIT)
research experiences which ultimately can strengthen national security andpromote innovation within the field.IX. References[1] A. B. Hunter, S. L. Laursen, and E. Seymour, “Becoming a scientist: The role of undergraduateresearch in students' cognitive, personal, and professional development,” Science Education, vol.91, no. 1, pp. 36-74, 2007.[2] CyberCorps® Scholarship for Service Program, November 2024 [Online] Available:https://sfs.opm.gov/[3] NSF 23-574: CyberCorps® Scholarship for Service (SFS), January 2025 [Online] Available:https://new.nsf.gov/funding/opportunities/sfs-cybercorps-scholarship-service/nsf23-574/solicitation[4] UTEP’s Cybercorps® Scholarship for Service Program Webpage, April 2025 [Online]Available: https://www.utep.edu/cs
Conference Session
Computing and Information Technology Division (CIT) Technical Session 2
Collection
2025 ASEE Annual Conference & Exposition
Authors
Peng Li, East Carolina University; Sohan Gyawali, East Carolina University
Tagged Divisions
Computing and Information Technology Division (CIT)
programmingassignments," Computer Science Education, vol. 15, no. 2, pp. 83–102, 2005. doi:10.1080/08993400500150747.[2] C. Douce, D. Livingstone, and J. Orwell, "Automatic test-based assessment of programming:A review," Journal on Educational Resources in Computing (JERIC), vol. 5, no. 3, pp. 4–es,2005. doi: 10.1145/1163405.1163409.[3] P. Li and L. Toderick, "An automatic grading and feedback system for e-learning ininformation technology education," in Proc. 2015 ASEE Annu. Conf. & Expo., Seattle, WA,USA, 2015, pp. 26.179.1–26.179.11. [Online]. Available: https://peer.asee.org/23518[4] C. L. Hull, "Simple trial and error learning: A study in psychological theory," PsychologicalReview, vol. 37, no. 3, pp. 241–256, 1930. doi: 10.1037/h0073614.[5] S. H
Conference Session
Computing and Information Technology Division (CIT) Technical Session 1
Collection
2023 ASEE Annual Conference & Exposition
Authors
Cheryl Lynn Resch, University of Florida
Tagged Divisions
Computing and Information Technology Division (CIT)
overflow vulnerabilities, using freely available resources.References [1] Bassett, G., Hylender, D., Langlois, P., Pinto, A., & Widup, S., “Data Breach Investigations Report” Available:https://www.verizon.com/business/resources/reports/dbir, 2022.[2] “NIST National Vulnerability Database” Available: https://nvd.nist.gov/vuln/data-feeds, 2023.[3] MITRE Common Vulnerabilities and Exposures. Available:https://cve.mitre.org/cve/data_feeds.html, 2023.[4] “Tenable’s 2021 Threat Landscape Retrospective” Available:https://www.tenable.com/cyber-exposure/2021-threat-landscape-retrospective, 2022.[5] Gueye, A., & Mell, P. “A Historical and Statistical Study of the SoftwareVulnerability Landscape”, arXiv preprint arXiv:2102.01722, 2021
Conference Session
Computing and Information Technology Division (CIT) Technical Session 2
Collection
2024 ASEE Annual Conference & Exposition
Authors
Emil H Salib, James Madison University
Tagged Divisions
Computing and Information Technology Division (CIT)
. In Section 5, we providebrief descriptions of the concepts behind four (4) newly created and tested WPA3 lab exercises.Finally, Section 6 engages in a discussion, encompassing our students’ observations, and sugges-tions for qualitative assessment of the lab instructions, the concepts they are based on, along withour conclusions and potential future steps.2 Our ProjectIn this section, we outline the project’s opportunity, goal, objectives, and the proposed solution.The overarching objective of this endeavor is to seamlessly integrate WPA3’s wireless personaland enterprise security mode, as defined by [1], into our existing Information Technology (IT)undergraduate curriculum. Specifically tailored for juniors and seniors majoring in IT, the
Conference Session
Computing and Information Technology Division (CIT) Technical Session 9
Collection
2025 ASEE Annual Conference & Exposition
Authors
Emre Tokgoz, State University of New York - Farmingdale; Alyssa Xiang
Tagged Divisions
Computing and Information Technology Division (CIT)
). Cham: Springer Nature Switzerland. 4. Erendor, M. E., & Yildirim, M. (2022). Cybersecurity awareness in online education: A case study analysis. Ieee Access, 10, 52319-52335. 5. Amankwa, E. (2021). Relevance of cybersecurity education at pedagogy levels in schools. Journal of Information Security, 12(4), 233-249. 6. Justice, C., & Sample, C. (2022, March). Future needs of the cybersecurity workforce. In International Conference on Cyber Warfare and Security (Vol. 17, No. 1, pp. 81-91). 7. Tran, T. M., Beuran, R., & Hasegawa, S. (2023). Gamification-based cybersecurity awareness course for self-regulated learning. International Journal of Information and Education Technology, 13(4), 724-730
Conference Session
Computing and Information Technology Division (CIT) Technical Session 6
Collection
2023 ASEE Annual Conference & Exposition
Authors
Joseph Paul Hardin; Marc Diaz; Amanpreet Kapoor
Tagged Divisions
Computing and Information Technology Division (CIT)
.[26] M. C. Jadud, “An exploration of novice compilation behaviour in BlueJ,” Comput. Sci. Educ., vol. 15:1, pp. 25–40, 2005, doi: 10.1080/08993400500056530.[27] J. M. Allen, F. Vahid, A. Edgcomb, K. Downey, and K. Miller, “An Analysis of Using Many Small Programs in CS1,” in Proceedings of the 50th ACM Technical Symposium on Computer Science Education, 2019, pp. 585–591. doi: 10.1145/3287324.3287466.[28] “Stepik.” https://stepik.org/ (accessed Feb. 28, 2023).[29] S. H. Edwards and K. P. Murali, “CodeWorkout: Short Programming Exercises with Built-in Data Collection,” in Proceedings of the 2017 ACM Conference on Innovation and Technology in Computer Science Education, 2017, pp. 188–193. doi: 10.1145
Conference Session
Computing and Information Technology Division (CIT) Technical Session 4
Collection
2024 ASEE Annual Conference & Exposition
Authors
Lily Liang, University of the District of Columbia; Briana Lowe Wellman, University of the District of Columbia; Rui Kang
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology Division (CIT)
preparation and professional development. Her 20+ publications include articles that appear in journals such as International Journal of Science and Mathematics Education, Journal of Social Studies Research, School Science and Mathematics, and Mathematics Teacher. She served as the Program Chair of the Special Interest Group (SIG) Democratic Citizenship in Education of the American Educational Research Association (AERA) from 2016 to 2018. She has taught high school mathematics and holds a clear renewable teaching certificate in mathematics in the state of Georgia. She currently serves as a Co-Principal Investigator (Co-PI) of a National Science Foundation (NSF) S-STEM grant. ©American Society
Conference Session
Computing and Information Technology Division (CIT) Technical Session 8
Collection
2025 ASEE Annual Conference & Exposition
Authors
Bing Wang, University of Connecticut; Suining He, University of Connecticut; Chuanrong Zhang, University of Connecticut; Abdul-Wassay Queeshi, University of Connecticut; Weidong Li, University of Connecticut; Sanguthevar Rajasekaran, University of Connecticut; Wei Wei, University of Connecticut; Elizabeth Howard, University of Connecticut
Tagged Divisions
Computing and Information Technology Division (CIT)
, 2002. [9] Houghton Mifflin. Project-based learning: Background knowledge & theory, 2003. http://www.college.hmco.com/education/pbl/background.html.[10] M. Fasli and M. Michalakopoulos. Supporting active learning through game-like exercises. In Proceedings of the 5th IEEE International Conference on Advanced Learning Technologies, pages 730–734. IEEE, 2005. doi: 10.1109/ICALT.2005.159.[11] R. Lawrence. Teaching data structures using competitive games. IEEE Transactions on Education, 47(4):459–466, 2004. doi: 10.1109/TE.2004.825053.[12] S. Lam, P. Yim, J. Law, and R. Cheung. The effects of classroom competition on achievement motivation. In Proc. of Annual Conference of the American Psychological Association, 2001.[13