Asee peer logo
Displaying results 91 - 120 of 123 in total
Conference Session
Computing and Information Technology Division (CIT) Technical Session 3
Collection
2025 ASEE Annual Conference & Exposition
Authors
Roberto Patricio Carú, Universidad Andres Bello; Juan Felipe Calderón, Universidad Andres Bello, Viña del Mar, Chile
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology Division (CIT)
parameters.Appendix 4 details the performance of the Gemini, ChatGPT, and Perplexity AI tools in thesetasks, providing practical examples of their capabilities. Through a mixed-methodology approachthat includes a literature review, case studies, and practical experimentation, this researchexplores how AI can optimize these areas and develops a theoretical and practical frameworkthat guides its effective and ethical implementation.Research ObjectivesThe primary purpose of this study is to explore and assess the impact of Artificial Intelligence(AI) on the management and operation of Information Systems (IS) within educational andbusiness environments. Specifically, the research aims to:1. Evaluate how AI can improve operational efficiency in information
Conference Session
Computing and Information Technology Division (CIT) Technical Session 2
Collection
2025 ASEE Annual Conference & Exposition
Authors
Iftekhar Ibne Basith, Sam Houston State University; Syed Hasib Akhter Faruqui, Sam Houston State University; Michael Tyler Johnson-Moore, Sam Houston State University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology Division (CIT)
takingadvantage of conscious muscle movement with little to no effect on other parts of the body, suchas moving ears or wrist muscles or flexing muscles to give commands to the robotic prosthesis.This approach, known as myoelectric control, uses electromyogram (EMG) signals recorded fromthe patient's residual muscles, which are then processed and used as control inputs to drive motorscoupled to the prosthetic limb [1]. Some research has been done to directly read intention frombrain scans, but this requires either an invasive brain implant, or that the patient to be placed inlarge machines with many probes reading the voltage of surface nerves of the skull. Non-invasiveBCI approaches typically use electroencephalography (EEG), where topical electric
Conference Session
Computing and Information Technology Division (CIT) Technical Session 7
Collection
2025 ASEE Annual Conference & Exposition
Authors
Udayan Das, Saint Mary's College of California
Tagged Divisions
Computing and Information Technology Division (CIT)
different institutions. While this data is not statistically significant (n=35)it could be indicative of the benefit of using more than 1 language in a data structures course, particularly onethat is relatively simple (Python) and one that is more strictly typed and object oriented (Java). This experiencereport will discuss the structure of the course in brief, including a discussion of where and when Python or Javawas used. I will discuss what went well and what I would change in the future, and include a suggested timelineof topics along with my suggested programming language to use for those topics. The student survey results arealso presented in detail. Keywords— CS2, Data Structures, Python, Java, Programming Languages, CS Education
Conference Session
Computing and Information Technology Division (CIT) Technical Session 9
Collection
2025 ASEE Annual Conference & Exposition
Authors
Emre Tokgoz, State University of New York - Farmingdale; Alyssa Xiang
Tagged Divisions
Computing and Information Technology Division (CIT)
Students’ Learning and During Decision Making the Coverage of Major-specific Concepts1 Emre Tokgoz, 2Alyssa Xiang, 3Julissa Molina, 4Sergio Duarte, 5Tanvir Ahmed, 6Joel Joseph 1 Emre.Tokgoz@farmingdale.edu; 2xiana21@farmingdale.edu; 3molij17@farmingdale.edu; 4 duarsp@farmingdale.edu; 5ahmet9@farmingdale.edu; 6josej18@farmingdale.edu1-6 Department of Computer Security, State University of New York, Farmingdale, New York, 11375As the cybersecurity field continues to grow, there are various factors that influence people’sinterest in seeking professional positions in cybersecurity. In academia, there are different methodsthat impact how students interact with others throughout an online course
Conference Session
Computing and Information Technology Division (CIT) Poster Session
Collection
2025 ASEE Annual Conference & Exposition
Authors
Amanda Nicole Smith, University of Florida; Sage Bachus, University of Florida; Ashish Aggarwal, University of Florida
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology Division (CIT)
positive correla-tion with performance, while PPE and Gender also exhibited statistically significant relationships,though Gender’s impact was minimal. These findings suggest that GPA and PPE are useful pre-dictors for early identification of students at risk of under performance, helping educators developtargeted strategies to support students in programming courses.1 IntroductionAs the demand for computational skills continue to rise in all engineering disciplines, there is anincreased focus on integrating programming courses into curricula for non-programming majors[1]. The introductory programming (CS1) course contains students with a range of majors andprior programming experience, which has led to a need for educators to identify
Conference Session
Computing and Information Technology Division (CIT) Technical Session 10
Collection
2025 ASEE Annual Conference & Exposition
Authors
Donggil Song, Texas A&M University; ANNE LIPPERT, Prairie View A&M University
Tagged Divisions
Computing and Information Technology Division (CIT)
completed a master’s program in Cognitive Science at SNU.ANNE LIPPERT, Prairie View A&M University ©American Society for Engineering Education, 2025 Work in Progress: Improving Engineering Students’ Writing Skills Through a Text Visualization ToolIntroductionDue to the importance of communication skills in the professional engineering field, engineeringcourses have incorporated writing and communication into their curricula [1]. Writing is amultifaceted process requiring critical thinking [2], creativity [3], and synthesis of ideas [4]. Forengineers in research careers, writing activates the cognitive and social processes, allowingstudents aiming for various engineering roles to contribute
Conference Session
Computing and Information Technology Division (CIT) Technical Session 6
Collection
2025 ASEE Annual Conference & Exposition
Authors
Derin Cayir, Florida International University; Mark Allen Weiss, Florida International University; Selcuk Uluagac, Florida International University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology Division (CIT)
experiences from the course.1 Introduction The Internet of Things (IoT) has become increasingly integral in shaping a technology-drivenlifestyle for consumers worldwide. IoT systems, characterized by interconnected sensors anddevices 1,2 , collect and transmit data through cloud servers to the Internet. This proliferation ofsmart network appliances and smart city environments, such as intelligent homes and vehicles,has been accompanied by a significant rise in cybersecurity vulnerabilities, often exploited at arate that outpaces the development of effective countermeasures. Given the increasing frequencyand severity of these security incidents, there is an urgent need for educational programs thatprepare STEM students to learn how to tackle these
Conference Session
Computing and Information Technology Division (CIT) Technical Session 6
Collection
2025 ASEE Annual Conference & Exposition
Authors
Nasrin Dehbozorgi, Kennesaw State University; Mourya Teja Kunuku, Kennesaw State University
Tagged Divisions
Computing and Information Technology Division (CIT)
shortcomings of the prior work, in this study we proposed a moreadvanced tool ‘Cogni -Reflect' powered by the capabilities of the LLMs for in-depth analysis ofstudents' reflections. In the following section, we provide an overview of the related literature,followed by our proposed methodology. We then conclude with discussions on the findings andoutline plans for future work.Related WorkStudents engage in reflection by critically evaluating their educational experiences, identifyingstrengths and areas for development, and formulating growth-oriented strategies. This processenhances self-awareness, critical thinking, and metacognitive abilities. Research indicates thatreflection boosts student engagement [1] and improves learning outcomes by helping
Conference Session
Computing and Information Technology Division (CIT) Technical Session 3
Collection
2025 ASEE Annual Conference & Exposition
Authors
Nestor L. Osorio, Northern Illinois University; Abul K. M. Azad, Northern Illinois University
Tagged Divisions
Computing and Information Technology Division (CIT)
Terms.IntroductionIt is well-known that Systematic Literature Review (SLR), a methodology for the analysis ofsubject literature, originated in the medical sciences as a tool for evidence-based decisions. For atleast the last ten years, other disciplines including Engineering Education (EE) have begun to usethis methodology. The following articles highlight the growing importance of SLRs in EE.Borrego, M. et al. [1] introduced systematic reviews as a methodology to advance engineeringeducation by synthesizing existing research and guiding future directions. The article discussedthe importance of systematic reviews in critically appraising literature to inform practice andpolicy in EE. By conducting a review of systematic reviews published since 1990
Conference Session
Computing and Information Technology Division (CIT) Technical Session 10
Collection
2025 ASEE Annual Conference & Exposition
Authors
Nikunja Swain, South Carolina State University; Biswajit Biswal, South Carolina State University; Janmejay Mohanty, South Carolina State University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology Division (CIT)
forstronger cybersecurity measures to avert future threats and prevent disruptions in the operationsof critical infrastructures [1]. Advanced Persistent threat is another attack that can cause severedamage to critical infrastructure due to its stealthy, dynamic, and adaptive nature [2]. Databreaches have been on the rise for several years, and sadly, this trend isn’t slowing down. Databreaches have affected companies and organizations of all shapes, sizes, and sectors such asApple, Meta, Twitter, T-Mobile, Colonial Pipeline, and they are costing US businessesmillions in damages [3], According to Cybersecurity Ventures, the global annual cost ofcybercrime is predicted to reach $9.5 trillion USD in 2024. Compounding this is the rising costof damages
Conference Session
Computing and Information Technology Division (CIT) Technical Session 6
Collection
2025 ASEE Annual Conference & Exposition
Authors
Gabriel Eduardo Prieto, Florida International University; Neila Bennamane, Florida International University; Agoritsa Polyzou, Florida International University; Peter J Clarke, Florida International University
Tagged Divisions
Computing and Information Technology Division (CIT)
interactions (the total virtual points awarded, time spent on learning objects, team performance, and number of comments posted), team assignments, and course grade data. The insights gained from this study may lead to more personalized learning experiences, enhancing student satisfaction and success rates in team-based learning environments.1 IntroductionIn recent years, there has been a significant focus on incorporating active learning strategies intohigher education, in particular in science, technology, engineering, and mathematics (STEM)fields, and assessing their value and impact on student well-being [16]. The goal of active learn-ing is to link the “activity” with “learning”. It is a broader educational strategy that
Conference Session
Computing and Information Technology Division (CIT) Poster Session
Collection
2025 ASEE Annual Conference & Exposition
Authors
Yug Patel, Missouri University of Science and Technology; Sanjana Shangle, University of Texas at Dallas; Asir Abrar, Missouri University of Science and Technology; Venkata Sriram Siddhardh Nadendla, Missouri University of Science and Technology; K Krishnamurthy, Missouri University of Science and Technology
Tagged Divisions
Computing and Information Technology Division (CIT)
performance of the task, particularly in high-stakes environments. Therefore, assessment and management of cognitive workload are vital toimproving operational efficiency, health outcomes and safety, particularly in individuals workingat computers 1 . Traditionally, cognitive workload has been assessed using unimodal data sources 2such as subjective surveys, behavioral metrics, heart rate and EEG signals. These unimodal datasources typically lack the necessary features to perform a wholesome assessment of cognitive * This research was sponsored in part by the National Science Foundation’s REU-Site Award #2150210, and inpart by the Army Research Laboratory and was accomplished under Cooperative Agreement Number #W911NF-24-2-0162. The views and
Conference Session
Computing and Information Technology Division (CIT) Technical Session 2
Collection
2025 ASEE Annual Conference & Exposition
Authors
Peng Li, East Carolina University; Sohan Gyawali, East Carolina University
Tagged Divisions
Computing and Information Technology Division (CIT)
deployment of newtechnologies. Additionally, both our face-to-face (F2F) and distance education (DE) studentpopulations are growing. Feedback to students is often delayed because of large class sizes. Toaddress these challenges, we have been incorporating virtual labs and automated assessments [1–2] into our information technology laboratory courses [3]. The labs and their environments haveundergone multiple updates to align with current technological trends.The most recent major redesign of the ICTN 4200/4201 Intrusion Detection Technologies courseoccurred during the 2021–2022 academic year. The new lab platform is built around a singleLinux virtual appliance that hosts multiple nested KVM virtual machines functioning as attackersor defenders. This
Conference Session
Computing and Information Technology Division (CIT) Technical Session 8
Collection
2025 ASEE Annual Conference & Exposition
Authors
Juan Felipe Calderón, Universidad Andres Bello, Viña del Mar, Chile; Matias Isaac Vargas
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology Division (CIT)
outcomes. For instance, Park's study highlights the importanceof structuring authentic learning tasks that encourage peer interactions, which can significantlyinfluence student engagement and performance. However, it is important to note that this studydid not find a direct relationship between behavioral interactions and performance scores. Itsuggests that peer interactions are beneficial but may not always correlate with improvedacademic outcomes[1]. This aligns with findings from Zen et al., who emphasize that project-based learning methodologies can enhance student engagement and academic achievement inonline settings[2]. Such insights are crucial for developing an effective OOP course that meetsthe varied needs of engineering
Conference Session
Computing and Information Technology Division (CIT) Technical Session 9
Collection
2025 ASEE Annual Conference & Exposition
Authors
Marjan Asadinia, California State University, Northridge; Sherrene Bogle, Cal Poly Humboldt; Rowena Quinn
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology Division (CIT)
andcomplex interactions in large datasets, this research aims to guide policymakers and healthcareprofessionals in designing more effective, data-driven strategies for promoting mental healthequity across both urban and rural settings.1 IntroductionMental health is an increasingly critical issue worldwide, affecting individuals across all demo-graphics and geographies. According to the Substance Abuse and Mental Health Services Admin-istration (SAMHSA), as many as 23.1% of adults in the United States experience mental healthchallenges annually, underscoring the urgency of addressing this growing public health crisis.Mental health outcomes are influenced by a multitude of factors, including socioeconomic condi-tions, environmental stressors
Conference Session
Computing and Information Technology Division (CIT) Technical Session 7
Collection
2025 ASEE Annual Conference & Exposition
Authors
Yu-Zheng Lin, The University of Arizona; Karan Patel, The University of Arizona; Ahmed H Alhamadah, The University of Arizona; Sujan Ghimire, The University of Arizona; Jesus Pacheco; Banafsheh Saber Latibari, The University of Arizona; Soheil Salehi, The University of Arizona; Pratik Satam, University of Arizona
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology Division (CIT)
with agile and responsive supply chains [1–3]. While these technologies bringsignificant benefits, their growing adoption has also increased the complexity of manufacturingsystems, making them increasingly difficult to manage, secure, and optimize. Thesetransformative changes make it critical for the 4IR workforce to have a strong understanding oftopics in 4IR, requiring reskilling of the existing workforce in addition to training a newworkforce, a mammoth task on scale [4]. However, such engineering training programs facemultiple obstacles. For instance, although online training programs are cost-effective, easy toscale, and are preferred for reskilling/upskilling efforts [5], 4IR workforce training requiresaccess to specialized hardware
Conference Session
Computing and Information Technology Division (CIT) Technical Session 2
Collection
2025 ASEE Annual Conference & Exposition
Authors
Jungsoo Lim, California State University, Los Angeles; Yilin Feng, California State University, Los Angeles; Babak Khollesi, East Los Angeles College, Monterey Park; Eun-young Kang, California State University, Los Angeles
Tagged Divisions
Computing and Information Technology Division (CIT)
holistic transfer pathway through the following keyinterventions: 1) establishing clear transfer pathways and roadmaps and updating articulationagreements, 2) providing adaptive and consistent advisement, incorporating new pathways information,3) aligning the CS1 courses between the 4-year and 2-year institutions, embedding socially responsiblecomponents (SRC) to encourage retention, especially among Hispanic and female students, 4) offeringacademic support, including boot camps for post-transfer students and tutoring for both pre-andpost-transfer students, and 5) building transfer student communities and facilitating resource sharing,managed by student ambassadors, via Discord and in-person social events.The joint team began implementing these
Conference Session
Computing and Information Technology Division (CIT) Technical Session 4
Collection
2025 ASEE Annual Conference & Exposition
Authors
Claire Han; Abel Andres Reyes-Angulo, Michigan Technological University; Sidike Paheding, Fairfield University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology Division (CIT)
Malware, Denial of Service, Phishing, and AI-related attacks 1 . For instance, bytraining employees properly, consistently updating technological systems to be more efficient and secure, and downloading antivirussoftware, Malware attacks can be largely prevented 2 .Despite these massive improvements, research supporting the booming cybersecurity field is still expanding adapt to changes andbecome more widespread. In recent years especially, browser security has been a concerning topic, leading to more research inthe area. Browsers are used in everyday life, from simple Google searches to the storage of important files in cloud drives, buthave also become mired with attacks. Malicious actors attempt to steal personal information to impersonate
Conference Session
Computing and Information Technology Division (CIT) Technical Session 5
Collection
2025 ASEE Annual Conference & Exposition
Authors
James Weichert, Virginia Polytechnic Institute and State University; Hoda Eldardiry, Virginia Polytechnic Institute and State University
Tagged Divisions
Computing and Information Technology Division (CIT)
and Waymo haveseen success in implementing partial or full autonomous driving in vehicles on live roads; and“Apple Intelligence” was the flagship feature for the launch of Apple’s new smartphone in fall2024. Yet what legal or policy response this technological growth will precipitate is less certain[1, 2]. Nevertheless, it should be expected that the development and enactment of regulatoryframeworks for AI will demand AI engineers with a command not only of the technicalintricacies of AI models, but also of the policy and regulatory landscape for AI development andcompliance [3]. This is made clear by the 2023 U.S. Executive Order on Safe, Secure, andTrustworthy Development and Use of Artificial Intelligence [4], which called for an “AI
Conference Session
Computing and Information Technology Division (CIT) Technical Session 10
Collection
2025 ASEE Annual Conference & Exposition
Authors
Abdulmalek Al-Gahmi, Weber State University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology Division (CIT)
, preprocessing, featureengineering, and modeling. The subsequent section examines the preprocessed data and itsdiversity. Afterward, the paper presents and discusses the results of all experiments conducted.Finally, the concluding section explores potential future work and offers final remarks.Background and Related WorkVarious approaches to predicting student performance have been explored. Some studies involvedesigning specific randomized experiments [1], [2], [4], [6], while others, like this one, focus onleveraging data collected by ubiquitous Learning Management Systems (LMSs) based on studentactivities and interactions with course materials [3], [8], [9]. Additionally, some researchevaluates the efficacy of specific teaching methodologies [4], [5
Conference Session
Computing and Information Technology Division (CIT) Technical Session 6
Collection
2025 ASEE Annual Conference & Exposition
Authors
hongbo zhang, Middle Tennessee State University; Reshma Rajan, Middle Tennessee State University
Tagged Divisions
Computing and Information Technology Division (CIT)
slides and blackboard/whiteboard were also obtained. Similarly, each conventional video is manually screened to ensure thecorrectness of the videos for this category. The selection criteria ensured a balancedrepresentation of both learning approaches to facilitate a robust comparative analysis.Figure 1: The examples of videos using the conventional teaching method. It shows the use of text,image, and diagram centered instruction approach for the teaching of robotics.It should be noted that the videos emphasizing embodied learning can also involve power pointslides through the entire instruction process. For this condition, the videos focusing on the use ofhardware and gesture through the entire instructional process will be classified as
Conference Session
Computing and Information Technology Division (CIT) Technical Session 4
Collection
2025 ASEE Annual Conference & Exposition
Authors
Tyler Clark, SageFox Consulting Group ; Rebecca Zarch, SageFox Consulting Group; Mikaela Hurd
Tagged Divisions
Computing and Information Technology Division (CIT)
lack of representation andpre-college support—often leave students feeling unprepared for academic progression andcareer readiness. Consequently, many students turn to external online courses, such as thoseoffered by Coursera, CodePath, or Breakthrough Tech AI, to bridge these deficiencies.External online courses have gained popularity due to their accessibility, self-paced structure,and ability to offer industry-relevant skills that may be underrepresented in traditional curricula.A 2021 report by Class Central [1] highlights that over 220 million learners worldwide haveregistered for massive open online courses (MOOCs), a trend driven by the flexibility andtailored learning these platforms provide. However, while these courses offer
Conference Session
Computing and Information Technology Division (CIT) Technical Session 9
Collection
2025 ASEE Annual Conference & Exposition
Authors
Frank Kreimendahl, Wentworth Institute of Technology
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology Division (CIT)
programming.to specific course topics on student evaluations to gauge studentreception of the blueprint. C. Motivation and Contributions Index Terms—computing, first-year, blueprints, CS I, CS II, A prior paper presented an analysis of student performancestudent success and described a blueprint designed to improve student reten- tion through a variety of resources.[1] Since the blueprint’s I. I NTRODUCTION initial design, faculty have used it for instruction in CS I andA. Who is
Conference Session
Computing and Information Technology Division (CIT) Poster Session
Collection
2025 ASEE Annual Conference & Exposition
Authors
Marjan Asadinia, California State University, Northridge; Sherrene Bogle, California Polytechnic State University Humboldt ; Rowena Quinn
Tagged Divisions
Computing and Information Technology Division (CIT)
Wear Balancing and Approximation for Efficient Non-Volatile Main Memory Management Rowena Quinn1 , Sherrene Bogle1 , and Marjan Asadinia2 1 Department of Computer Science, California State Polytechnic University, Humboldt, USA, Rowena.Quinn@humboldt.edu, Sherrene.Bogle@humboldt.edu 2 Department of Computer Science, California State University, Northridge, USA, marjan.asadinia@csun.edu Abstract Phase Change Memory (PCM) is an emerging non-volatile memory technology that lever- ages the thermal properties of chalcogenide glass to transition between amorphous and crys
Conference Session
Computing and Information Technology Division (CIT) Poster Session
Collection
2025 ASEE Annual Conference & Exposition
Authors
Hyeree Cho, Purdue Polytechnic Institute, Purdue University – West Lafayette; Woongbin Park, Purdue University at West Lafayette
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology Division (CIT)
and career choicesamong students.Introduction Globally, there is a trend of students preferring computer-related majors within theSTEM fields, with enrollment rates surpassing those seen during the dot-com bubble of the late1990s [1, 2]. Furthermore, in East Asia, particularly in South Korea, the intense focus oneducation has led to an increasing number of students opting to study abroad due todissatisfaction with the domestic educational environment [3]. Alongside this trend, weconducted research to understand the background of Korean students’ decisions to studycomputer-related fields in the U.S. as well as their academic experiences after making thosechoices [4]. This qualitative case study explored how various factors, including
Conference Session
Computing and Information Technology Division (CIT) Technical Session 10
Collection
2025 ASEE Annual Conference & Exposition
Authors
Rajendran Swamidurai, Alabama State University; Uma Kannan, Alabama State University
Tagged Divisions
Computing and Information Technology Division (CIT)
Fall 2020 to Spring 2024 that include those that focus on cybersecurityprofessional skills. Our external evaluation data shows that students demonstrated particularconfidence in their ability to solve problems, persevere in seeking solutions, and acquireknowledge in cybersecurity. They also expressed confidence that they will be able to understandwhat they learn about cybersecurity.1. IntroductionCyberspace and the Internet serve as the foundation of any country's modern economy andnational security since they have become part of the country's homeland, much like cities,mountains, and coastlines, and practically all of our daily activities, such as shopping andbanking, take place in cyberspace [1]. Because a breach or attack will inflict
Conference Session
Computing and Information Technology Division (CIT) Technical Session 8
Collection
2025 ASEE Annual Conference & Exposition
Authors
Bing Wang, University of Connecticut; Suining He, University of Connecticut; Chuanrong Zhang, University of Connecticut; Abdul-Wassay Queeshi, University of Connecticut; Weidong Li, University of Connecticut; Sanguthevar Rajasekaran, University of Connecticut; Wei Wei, University of Connecticut; Elizabeth Howard, University of Connecticut
Tagged Divisions
Computing and Information Technology Division (CIT)
capabilities. Drones and Unmanned AerialVehicles (UAVs) offer flexible and high-resolution data collection for various applications, suchas agriculture, disaster response, and urban planning. Internet of Things (IoT) sensors deployed invarious environments collect real-time data on weather, air quality, soil moisture, and more.Smartphones and other portable devices with GPS and various sensors provide vast amounts oflocation-based data. CI supports the entire cycle of data acquisition, transfer, storage, processing,and visualization of large-scale data 1 . It has become a critical resource for many applications andscientific discovery 2,3 . While the importance of CI is well recognized in the scientific communityand industry, the education and
Conference Session
Computing and Information Technology Division (CIT) Technical Session 8
Collection
2025 ASEE Annual Conference & Exposition
Authors
Juan Felipe Calderón, Universidad Andres Bello, Viña del Mar, Chile; Marco Aguilera; Martin Ignacio Gil; Maria Elena Truyol, Universidad Andres Bello, Santiago, Chile; Danilo Leal, Universidad Andres Bello; Claudia Bascur, Universidad Andres Bello, Santiago, Chile
Tagged Divisions
Computing and Information Technology Division (CIT)
like programming, where innovative methodologieshave outperformed traditional teaching methods [1], [2]. Adaptive learning technologies arecrucial for customizing educational experiences to meet diverse student needs, promotingflexibility and adaptability within VLEs. Implementing LLMs can enhance this adaptive learningby providing real-time feedback and support, fostering a more engaging educationalenvironment. Studies have shown that generative artificial intelligence tools, such as ChatGPT,can motivate students, increase participation, and offer individualized assistance, therebyimproving learning experiences[3], [4]. However, there are notable gaps in the practicalapplication of LLMs within VLEs, as many institutions struggle to integrate
Conference Session
Computing and Information Technology Division (CIT) Technical Session 8
Collection
2025 ASEE Annual Conference & Exposition
Authors
Danushka Bandara, Fairfield University; Djedjiga Belfadel, Fairfield University
Tagged Divisions
Computing and Information Technology Division (CIT)
promotingcritical thinking and real-world application compared to traditional methods. Students also recognizedGenAI as both a valuable learning tool and a potential risk to academic integrity. These findingscontribute to the ongoing discourse on adapting higher education to the challenges and opportunitiespresented by GenAI, ensuring assessments remain relevant and effective in fostering meaningfullearning outcomes.1. IntroductionThe role of assessments in higher education is fundamental to evaluating student learning, fosteringcritical thinking, and preparing learners for real-world challenges. Traditional assessment methods—such as homework essays, and problem sets—have long been regarded as the cornerstone of educationalevaluation. However, as
Conference Session
Computing and Information Technology Division (CIT) Technical Session 9
Collection
2025 ASEE Annual Conference & Exposition
Authors
Omar Ochoa, Embry-Riddle Aeronautical University - Daytona Beach; Radu F. Babiceanu, Western Michigan University; Salamah Salamah, University of Texas at El Paso
Tagged Divisions
Computing and Information Technology Division (CIT)
ResearchI. IntroductionIt has been shown that integrating research opportunities into students' academic journeys is apivotal strategy for developing the next generation of experts [1]. This is particularly true indynamic and rapidly evolving fields, e.g., cybersecurity. Within the cybersecurity domain thedemand for skilled professionals continues to escalate, mainly in response to the increasing digitalthreats and the complexity of safeguarding information systems. Skilled cybersecurityprofessionals must have the ability to identify, analyze, act upon, and meticulously documentfindings to effectively combat cybersecurity threats and attacks. Thus, there is a dire need to trainand develop cybersecurity professionals to meet the escalating needs of