Asee peer logo
Displaying results 31 - 47 of 47 in total
Conference Session
Laboratory and Internship Innovations in IT/IS
Collection
2007 Annual Conference & Exposition
Authors
Michael Bailey, Brigham Young University; Michael Moore, Brigham Young University; Joseph Ekstrom, Brigham Young University
Tagged Divisions
Information Systems
ofuse, and in the case of the drives, portability between host computers. Other comparisons suchas weight and cost are readily apparent, but were evaluated according to their importance to thestudents. The study found that portable hard drives are an effective compromise between cost,flexible lab use, and performance.IntroductionEducating future Information Technology (IT) practitioners can be a very costly endeavor for auniversity due to the expense of obtaining, updating and maintaining computer hardware forstudent practicum. Typical IT laboratory curriculum includes networking, web programming,database development, information assurance and security, and system administration, all ofwhich may have unique system and configuration requirements
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2010 Annual Conference & Exposition
Authors
Ashley Banaszek, Missouri University of Science and Technology; Hong Sheng, Missouri University of Science and Technology; Richard Hall, Missouri University of Science and Technology; Ronaldo Luna, Missouri University of Science and Technology; Ghulam Bham, Missouri University of Science and Technology
Tagged Divisions
Information Systems
tutorialswere very positive. Finally, although most participants found the system relatively easy to useand consistent to their learning styles, one mentioned that “it’s a great program, but the programdidn’t work for me.” Unfortunately, he neglected to elaborate his response.Unique ContributionsThis module is one part of comprehensive curriculum development in Civil Engineering atMissouri S&T. Instead of developing a separate course on Geographic Information Systems,GIS modules were developed especially to integrate into existing courses. Such an approachhas broad implications for a model in which new technological approaches can be seamlesslyintegrated into existing courses. Second, this research demonstrates how a systematicqualitative approach
Conference Session
IT-based Instructional Technologies
Collection
2010 Annual Conference & Exposition
Authors
Yi-Cheng Chen, Meiho Institute of Technology; Yi-Chien Lin, Meiho Institute of Technology; Ron Chuen Yeh, Meiho Institute of Technology, Taiwan; Kuo-Hung Tseng, Meiho Institute of Technology
Tagged Divisions
Information Systems
suggestedthat educational institutions should place more emphases on the fundamental courses to cultivatestudents with essential skills/knowledge and capabilities to cope independently with highlychangeable business environment.On the other side, some of the interviewed faculty members of the IT department signified thatuniversity-level IT education should emphasize more on an in-depth knowledge of howemerging EC technologies can be applied by business firms as well as an in-depth understandingof databases management systems, systems analysis and design, implementation, integration andmanagement issues. The comparison between the IT curriculum and the survey results showsthat many of the important topics were not extensively taught, for example
Conference Session
Emerging Information Technologies
Collection
2009 Annual Conference & Exposition
Authors
Stephen Gilbert, Iowa State University; Pam Shill, Iowa State University; Kevin Saunders, Iowa State University
Tagged Divisions
Information Systems
. Page 14.1255.1© American Society for Engineering Education, 2009 Successful Use of Teams in a Human Computer Interaction REU: Combining Intensive Instruction with Strong MentoringAbstractSPIRE-EIT (Summer Program for Interdisciplinary Research and Education – EmergingInterface Technologies) at Iowa State University is a 10-week interdisciplinary summer ResearchExperience for 15 Undergraduates (NSF-funded) that integrates research and education inemerging interface technologies. Students are recruited from engineering, computer science,psychology, and design for an interdisciplinary mix. Classes in both content and professionaldevelopment occupy approximately 35% of the students’ time: computer programming andgraphics
Conference Session
Information and Network Security
Collection
2008 Annual Conference & Exposition
Authors
Okechi Egekwu, James Madison University
Tagged Divisions
Information Systems
to ease adoption pains. The paper will also discuss efforts at James MadisonUniversity to expose students to the various aspects of this technology.RFID NetworksAt the enterprise level, an RFID system will comprise many different technologies, includingbarcodes systems, passive and active tags, GPS/GIS systems, and chain of smart software – thehardware and software from different vendors must be seamlessly integrated. See Figure 1 forrepresentative auto ID technologies that one will find in a robust enterprise system. Transport Movement Item Packaging Unit Load Container unit
Conference Session
IT-based Instructional Technologies
Collection
2009 Annual Conference & Exposition
Authors
Mysore Narayanan, Miami University
Tagged Divisions
Information Systems
Based UnitsIntel Education informs that:Authentic project work puts students in the driver's seat of their own learning. Itis important that instructors take advantage of curriculum developed by teachersin a large collection of Unit Plans that integrate technology. Models ofmeaningful classroom projects that integrate instruction in thinking skills alongwith tools and strategies for developing one’s own exemplary technology-supported learning are always encouraged. They focus on three areas:1. It is important to learn how project-based units can effectively engage students in meaningful work and promote higher-order thinking.2. It is necessary to see how questions and ongoing assessment keep project work focused on important learning goals
Conference Session
Security
Collection
2006 Annual Conference & Exposition
Authors
Tim Lin, California State Polytechnic University-Pomona; Saeed Monemi, California State Polytechnic University-Pomona
Tagged Divisions
Information Systems
enhancing with the securitycomponents in the last few years.This paper is organized as follows: section 1 as an introduction to discuss the general securityeducation curriculum, section 2 discusses the different stages of security proficiencies theinstructor can teach the students, section 3 talks about the engineering courses that can havesecurity education components, section 4 gives a detailed treatment of security materials inseveral engineering courses, and section concludes the security education with future efforts.2. Stages of Security Proficiency for the Students Page 11.1109.3Though security education has aroused widespread interests and the
Conference Session
Emerging Information Technologies
Collection
2010 Annual Conference & Exposition
Authors
J. Wey Chen, Southern Taiwan University
Tagged Divisions
Information Systems
Page 15.112.2students actively understand underlying concepts. This paper formulates an alternativepedagogical approach that encompasses the van Hiele model of geometric thought, the cognitivemodel, and Bayesian network to design a web-based intelligent van Hiele ProblemSolver(IVHPS). The system takes full advantage of Bayesian networks (BNs) , which are a formalframework for uncertainty management to provide intelligent navigation support, and to makeindividualized diagnosis of student solutions in learning computer programming. In addition, wedescribe the architecture of the system and the roles of seven modules contained in the system.They are all integrated into the environment to increase student satisfaction and achievement bystimulating
Conference Session
Emerging Information Technologies
Collection
2008 Annual Conference & Exposition
Authors
Curtis Welborn, Utah Valley State College; Reza Sanati-Mehrizy, Utah Valley State College
Tagged Divisions
Information Systems
EER notation. FIGURE 6. Original EER for Constraint 4ConclusionTemporal constraints are often integral to the correct operation of a business, yet they areseldom captured in a high-level notation such as EER. This means that the fundamentalinteraction of temporal constraints on the business are often only captured in detailedrequirements or, even worse, only in code.James Allen [2] defines a non-primitive relationship “in” which allows one interval bewholly within another interval. The “in” relationship would be an even more appropriaterelationship than the “during” relationship to be used for our examples. The “during”relationship was used because it is a primitive relationship and the introduction of non-primitive
Conference Session
Information and Network Security
Collection
2008 Annual Conference & Exposition
Authors
Richard Smith, U. of St. Thomas - St. Paul
Tagged Divisions
Information Systems
• Security technologies • Security planning and architectureWhile developing this course, the CIS department also developed an information security majorprogram that would fulfill US government requirements for information security education. Thedepartment would seek certification for the major under the Information Assurance CoursewareEvaluation Program9. Since the curriculum focuses on training “information securityprofessionals,” the department sought to meet the requirements of Instruction 4011 of theCommittee for National Security Systems7. Although this document dates from 1994, it is stillthe curriculum standard used by the US government. To support this, the course includesexercises to cover almost all “learning outcomes” listed in the
Conference Session
IT-based Instructional Technologies
Collection
2009 Annual Conference & Exposition
Authors
Tal Rusak, Cornell University; Christopher Barnes, Cornell University; G. Scott Russ, Cornell University; Vincent Kam, Cornell University; David Gries, Cornell University
Tagged Divisions
Information Systems
AC 2009-2507: CPAS: ON THE STRUCTURE AND USABILITY OF ACOURSE-PLANNING AND AUDIT SYSTEMTal Rusak, Cornell University Tal Rusak is an undergraduate student at the Department of Computer Science at Cornell University, graduating May 2009. Tal's interests lie in understanding the structure of networks and novel computing systems as well as in the theory and practice of engineering and computer science education. Tal was recognized as the 2009 Computing Research Association (CRA) Outstanding Undergraduate Award Winner. Tal's research in modeling the temporal variations of low-power wireless network links has been published internationally and was recognized by the Best Paper Award at ACM
Conference Session
Emerging Information Technologies
Collection
2009 Annual Conference & Exposition
Authors
C. Richard Helps, Brigham Young University; Bret Swan, Brigham Young University
Tagged Divisions
Information Systems
and participate in capstone projects to achieve substantive deliverables that do not result ina working product or system.Students building a working prototype product or system are operating in primarily in theproduct-oriented, phase of the complete system development life cycle. There are hiddenassumptions in the design of capstone courses that encourage students to work in that phase.A student team can accomplish the learning objectives of a technical capstone project byfollowing a clearly defined design and development process resulting in project deliverables thatare not a working prototype.Recently, an Information Technology (IT) capstone student team at Brigham Young Universityselected a project that requires them to follow a systems
Conference Session
Information and Network Security
Collection
2009 Annual Conference & Exposition
Authors
Kyle Lutes, Purdue University; John Springer, Purdue University; Kelly Howard, Purdue University
Tagged Divisions
Information Systems
AC 2009-2375: A SURVEY OF EMBEDDED DATABASE TECHNOLOGY FORMOBILE APPLICATIONSKyle Lutes, Purdue University Kyle Lutes is an Associate Professor for the Department of Computer & Information Technology (CIT) at Purdue University. Kyle joined the department in 1998 and is the chair of the department’s software development curriculum. His teaching and scholarly interests cover a broad range of software development areas including software applications for mobile devices, data-centered application development, and software entrepreneurialism. He has authored/co-authored numerous papers and two college textbooks on various software development-related topics. Prior to his current
Conference Session
Information and Network Security
Collection
2010 Annual Conference & Exposition
Authors
Hetal Jasani, Northern Kentucky University
Tagged Divisions
Information Systems
] Rosenberg C., Koo, S. G. M. (2002). Innovative and easy-to-deploy communication networking laboratory experiments for electrical and computer engineering students, Proceedings of 32nd Annual conference on Frontiers in Education, Como, Italy.[20] Yuan, D., Zhong, J., (2009). An Instructional Design of Open Source Networking Lab and Curriculum, Proceedings of the 10th ACM SIGITE conference on Information technology education, pp37-42. Page 15.875.13
Conference Session
IT-based Instructional Technologies
Collection
2007 Annual Conference & Exposition
Authors
Edward Gehringer, North Carolina State University
Tagged Divisions
Information Systems
scratch the surface, but I am hopeful that it has given the reader a good overview ofthe techniques that are available. Reading individual papers will convey good ideas, a few at atime. To peruse techniques in larger batches, become familiar with the following resources. • For an overview of considerations in applying ACL to computing, and how to go about integrating it into your courses, see Jeffrey McConnell’s series in Inroads.19, 20, 21, 22 • For a large set of games that can be played in class, see http://www.thiagi.com/games.html. • For programming puzzles that can be turned into games, Pollard and Duvall27 recommend the “Head First” series of books.10, 30 • A large set of kinesthetic learning
Conference Session
IT-based Instructional Technologies
Collection
2007 Annual Conference & Exposition
Authors
Julie Mariga, Purdue University
Tagged Divisions
Information Systems
Degrees and SpecializationsThe Need for the CourseDue to the growth in networking and virtual technologies and the need for undergraduatestudents in non-networking majors to understand and learn about network protocols,network operating system fundamentals, network operating systems, database and webservers and directory services, a course for IST students was developed. The course alsowas a result of feedback given to CIT by their Industrial Advisory Board (IAB). Prior toABET creating an information technology accreditation for IT programs, CIT relied onthe IAB for feedback on ways to improve the curriculum and facilities. In 2000, one ofthe main action items given to CIT from the IAB was that IST students needed to havehands-on experience with
Conference Session
Information and Network Security
Collection
2008 Annual Conference & Exposition
Authors
Peng Li, East Carolina University; Tijjani Mohammed, East Carolina University; Lee Toderick, East Carolina University; Chengcheng Li, East Carolina University; Philip Lunsford, East Carolina University
Tagged Divisions
Information Systems
technology.Third, enrollments in our programs have increased significantly, especially in the distanceeducation sections, which has stretched laboratory resources to their limits, making it hard tomeet demands for remote labs. With virtual machine technology, it is possible to deploy adiversified virtual network lab at a minimal cost. The virtual machine technology permits rapidchanges, deployments, and adaptation of curriculum and laboratory experiences in step with the Page 13.80.2advances in technology. The purpose of this paper is to present the design and implementation ofa portable virtual network security lab, as part of our ongoing effort to