theory in three engineering education journals: 1995–2008. Journal of Engineering Education, 100(2):281–303, 2011. [9] PH Collins and S Bilge. Intersectionality. Polity Press, Cambridge (UK), 2016.[10] Kimberl´e Crenshaw. Demarginalizing the intersection of race and sex: A black feminist critique of antidiscrimination doctrine, feminist theory and antiracist politics. U. Chi. Legal F., page 139, 1989.[11] Richard Delgado and Jean Stefancic. Critical race theory: An introduction, 2001.[12] Erin A Cech. The intersectional privilege of white able-bodied heterosexual men in STEM. Science Advances, 8(24):eabo1558, 2022.[13] Sarah L Rodriguez, Charles Lu, and Daisy Ramirez. Creating a conceptual framework for computing identity
smart home networks. In NDSS, 2022. [8] Leonardo Babun, Amit Kumar Sikder, Abbas Acar, and A Selcuk Uluagac. The truth shall set thee free: Enabling practical forensic capabilities in smart environments. In NDSS, 2022. [9] Derin Cayir, Reham Mohamed, Riccardo Lazzeretti, Marco Angelini, Abbas Acar, Mauro Conti, Z Berkay Celik, and Selcuk Uluagac. Speak up, i’m listening: Extracting speech from zero-permission vr sensors. In NDSS, 2025.[10] H. Maenpaa, S. Varjonen, A. Hellas, S. Tarkoma, and T. Mannisto. Assessing iot projects in university education - a framework for problem-based learning. In 2017 IEEE/ACM 39th International Conference on Software Engineering: Software Engineering Education and Training Track (ICSE-SEET
positive[THE SHIFT TOWARDS INCLUSION AND ACCESSIBILITY] 15social change. This study serves as a model for educators seeking to incorporate accessibility andinclusive design into their curricula, offering insights into structuring courses that combinetheory, practice, and real-world engagement. The outcomes of this course demonstrate theprofound impact of inclusive design education in shaping the next generation of designers andtechnologists, ensuring that accessibility remains at the forefront of innovation and development.[THE SHIFT TOWARDS INCLUSION AND ACCESSIBILITY] 16 ReferencesBarteaux, S. (2014
points, with Group 1's average being5.81 and Group 2's being 4.91. This indicates that, on average, Group 1 achieved higher gradesthan Group 2.Applying ANOVA to compare performance (final grade) between Group 1 and Group 2 yieldsan F-statistic value of 116.8963 and a p-value of approximately 7.411684e-13. The p-value isextremely low (much lower than any standard significance threshold, such as 0.05), indicating astatistically significant difference between the two groups' final grades. This suggests thatacademic performance (measured by final grade) significantly differs between Group 1 andGroup 2.Analysis of Students' Work ExperienceBoth groups belong to the evening session, mainly consisting of students working during the day.Additionally
frames. TheOpcode is input from switches 13-17 on the left side. The binary output value is displayed in thegroup of eight LEDs on the right, while its decimal value is displayed in the three 7-segmentdisplays 0-2 on the right, highlighted with white frames.Conceptual DesignIn terms of CPU design, each operation within the instruction set can be viewed as a separatemodule. The adder is the most frequently utilized component within an ALU, as it is involved innumerous operations. Subtraction can be implemented as addition when the subtrahend isrepresented as a negative number in 2’s complement format. Additionally, integer multiplicationcan be achieved through a combination of left shifting and addition/subtraction. To illustrate thispoint, the
freeradius clients(AP/authenticators) to the radius-rasp server. To launch the radius server and test its configura-tions, we exercised the following commands in separate shells: sudo freeradius −X radtest testuser testcheckout localhost 1812 testsecret eapol test −c eapol− ttls .conf −a localhost −p 1812 −s testsecret −r1where the eapol-ttls.conf is given in Appendix A.2.1.wpa-rasp: In support of WPA3-Personal security mode (including SAE and PMF), the wpa-raspwas configured according to the wpa supplicant.conf configuration example given in AppendixA.2.2.To launch the wpa-rasp, we exercised the following command: sudo wpa supplicant −D nl80211 −i wlan1 −c wpa supplicant.conf −dd −Kwhere -D is the driver, -i interface, -c configuration
components in one grading bundle withspecifications grading. For the group assessments, the system included an individual contributionscomponent, which would impact the final grade for a student.Overall, the grading load was not higher than the traditional grading system. The author hadfewer conflicts with students and little to no discussions about partial credit. It was a positiveexperience and the author would recommend this system to other Computer Networks courseinstructors.References [1] Alison Clear and Allen S Parrish. Computing curricula 2020. Computing Curricula, 2020. [2] Association for Computing Machinery (ACM) Joint Task Force on Computing Curricula and IEEE Computer Society. Computer Science Curricula 2013: Curriculum Guidelines
. Buckner, "A non-traditonal approach to an assembly language course." Journal of Computing Sciences in Colleges 22.1 (2006): 179-186.[5]Imamura, Kosuke. "Assembly language is more than a teaching tool." Journal of Computing Sciences in Colleges 20, no. 2 (2004): 49-54.[6]Little, R. Rainey, and Mark K. Smotherman. "Assembly language courses in transition." ACM SIGCSE Bulletin 20, no. 1 (1988): 95-99.[7]Chmiel, Ryan, and Michael C. Loui. "Debugging: from novice to expert." ACM SIGCSE Bulletin 36, no. 1 (2004): 17-21.[8]Adolph, Karen E., and Kari S. Kretch. "Gibson’s theory of perceptual learning." International encyclopedia of the social and behavioral sciences 10 (2015): 127-134.[9]Fincher, Sally, Johan Jeuring, Craig S. Miller, Peter
scanning, denial-of-service attacks, SQL injection, cryptography, penetration testing,threat management, identity management, identification and mitigation of security risks, andnetwork access control.Digital Forensics: This course covers topics such as hashing and validations, data erasure, filecarving, file signatures, slack space, string search, regular expressions, forensic discovery,analyzing system times, file system analysis, systems and subversion, deleted file systempersistence, and system processes. This course leveraged topics typically found in ISC2(Association for Inspiring a Safe and Secure Cyber World)’s CHFI (Certified Hacking ForensicsInvestigator).3. ResultsThis result summarizes feedback from student surveys taken in the Spring
andprofessional trajectories of CS students.References[1] D. Shah. “By the numbers: MOOCs in 2021.” Class Central. Accessed: Feb. 20, 2025. [Online.] Available: https://www.classcentral.com/report/mooc-stats-2021/[2] L. J. Sax, M. A. Kanny, T. A. Riggers-Piehl, H. Whang, and L. N. Paulson. “‘But I’m not good at math’: The changing salience of mathematical self-concept in shaping women’s and men’s STEM aspirations,” Research in Higher Education, vol. 58, no.7, pp. 763–794, Feb. 2017, doi: 10.1007/s11162-017-9450-6.[3] National Center for Education Statistics, 2020, “Completions,” Integrated Postsecondary Education Data System (IPEDS). [Online]. Available: https://nces.ed.gov/ipeds/use-the-data[4] S. Mithun and X
research experiences which ultimately can strengthen national security andpromote innovation within the field.IX. References[1] A. B. Hunter, S. L. Laursen, and E. Seymour, “Becoming a scientist: The role of undergraduateresearch in students' cognitive, personal, and professional development,” Science Education, vol.91, no. 1, pp. 36-74, 2007.[2] CyberCorps® Scholarship for Service Program, November 2024 [Online] Available:https://sfs.opm.gov/[3] NSF 23-574: CyberCorps® Scholarship for Service (SFS), January 2025 [Online] Available:https://new.nsf.gov/funding/opportunities/sfs-cybercorps-scholarship-service/nsf23-574/solicitation[4] UTEP’s Cybercorps® Scholarship for Service Program Webpage, April 2025 [Online]Available: https://www.utep.edu/cs
programmingassignments," Computer Science Education, vol. 15, no. 2, pp. 83–102, 2005. doi:10.1080/08993400500150747.[2] C. Douce, D. Livingstone, and J. Orwell, "Automatic test-based assessment of programming:A review," Journal on Educational Resources in Computing (JERIC), vol. 5, no. 3, pp. 4–es,2005. doi: 10.1145/1163405.1163409.[3] P. Li and L. Toderick, "An automatic grading and feedback system for e-learning ininformation technology education," in Proc. 2015 ASEE Annu. Conf. & Expo., Seattle, WA,USA, 2015, pp. 26.179.1–26.179.11. [Online]. Available: https://peer.asee.org/23518[4] C. L. Hull, "Simple trial and error learning: A study in psychological theory," PsychologicalReview, vol. 37, no. 3, pp. 241–256, 1930. doi: 10.1037/h0073614.[5] S. H
overflow vulnerabilities, using freely available resources.References [1] Bassett, G., Hylender, D., Langlois, P., Pinto, A., & Widup, S., “Data Breach Investigations Report” Available:https://www.verizon.com/business/resources/reports/dbir, 2022.[2] “NIST National Vulnerability Database” Available: https://nvd.nist.gov/vuln/data-feeds, 2023.[3] MITRE Common Vulnerabilities and Exposures. Available:https://cve.mitre.org/cve/data_feeds.html, 2023.[4] “Tenable’s 2021 Threat Landscape Retrospective” Available:https://www.tenable.com/cyber-exposure/2021-threat-landscape-retrospective, 2022.[5] Gueye, A., & Mell, P. “A Historical and Statistical Study of the SoftwareVulnerability Landscape”, arXiv preprint arXiv:2102.01722, 2021
. In Section 5, we providebrief descriptions of the concepts behind four (4) newly created and tested WPA3 lab exercises.Finally, Section 6 engages in a discussion, encompassing our students’ observations, and sugges-tions for qualitative assessment of the lab instructions, the concepts they are based on, along withour conclusions and potential future steps.2 Our ProjectIn this section, we outline the project’s opportunity, goal, objectives, and the proposed solution.The overarching objective of this endeavor is to seamlessly integrate WPA3’s wireless personaland enterprise security mode, as defined by [1], into our existing Information Technology (IT)undergraduate curriculum. Specifically tailored for juniors and seniors majoring in IT, the
). Cham: Springer Nature Switzerland. 4. Erendor, M. E., & Yildirim, M. (2022). Cybersecurity awareness in online education: A case study analysis. Ieee Access, 10, 52319-52335. 5. Amankwa, E. (2021). Relevance of cybersecurity education at pedagogy levels in schools. Journal of Information Security, 12(4), 233-249. 6. Justice, C., & Sample, C. (2022, March). Future needs of the cybersecurity workforce. In International Conference on Cyber Warfare and Security (Vol. 17, No. 1, pp. 81-91). 7. Tran, T. M., Beuran, R., & Hasegawa, S. (2023). Gamification-based cybersecurity awareness course for self-regulated learning. International Journal of Information and Education Technology, 13(4), 724-730
.[26] M. C. Jadud, “An exploration of novice compilation behaviour in BlueJ,” Comput. Sci. Educ., vol. 15:1, pp. 25–40, 2005, doi: 10.1080/08993400500056530.[27] J. M. Allen, F. Vahid, A. Edgcomb, K. Downey, and K. Miller, “An Analysis of Using Many Small Programs in CS1,” in Proceedings of the 50th ACM Technical Symposium on Computer Science Education, 2019, pp. 585–591. doi: 10.1145/3287324.3287466.[28] “Stepik.” https://stepik.org/ (accessed Feb. 28, 2023).[29] S. H. Edwards and K. P. Murali, “CodeWorkout: Short Programming Exercises with Built-in Data Collection,” in Proceedings of the 2017 ACM Conference on Innovation and Technology in Computer Science Education, 2017, pp. 188–193. doi: 10.1145
preparation and professional development. Her 20+ publications include articles that appear in journals such as International Journal of Science and Mathematics Education, Journal of Social Studies Research, School Science and Mathematics, and Mathematics Teacher. She served as the Program Chair of the Special Interest Group (SIG) Democratic Citizenship in Education of the American Educational Research Association (AERA) from 2016 to 2018. She has taught high school mathematics and holds a clear renewable teaching certificate in mathematics in the state of Georgia. She currently serves as a Co-Principal Investigator (Co-PI) of a National Science Foundation (NSF) S-STEM grant. ©American Society
, 2002. [9] Houghton Mifflin. Project-based learning: Background knowledge & theory, 2003. http://www.college.hmco.com/education/pbl/background.html.[10] M. Fasli and M. Michalakopoulos. Supporting active learning through game-like exercises. In Proceedings of the 5th IEEE International Conference on Advanced Learning Technologies, pages 730–734. IEEE, 2005. doi: 10.1109/ICALT.2005.159.[11] R. Lawrence. Teaching data structures using competitive games. IEEE Transactions on Education, 47(4):459–466, 2004. doi: 10.1109/TE.2004.825053.[12] S. Lam, P. Yim, J. Law, and R. Cheung. The effects of classroom competition on achievement motivation. In Proc. of Annual Conference of the American Psychological Association, 2001.[13