, operating systems, network gaming, computer programming and applications, microcontroller systems.Sophia Scott, Southeast Missouri State University Dr. Sophia Scott is an Assistant Professor in the Department of Industrial and Engineering Technology at Southeast Missouri State University. She currently teaches courses in technical communication, supervision and project management. Dr. Scott received her Ph.D. in Technology Management from Indiana State University. Her research interests include curriculum and lab development, teams, leadership, ethics, experiential learning and project management
outcomes. Students develop an electronic portfolio that includes samples oftheir most important learning experiences which may be projects, term papers, extracurricularexperiences, as well as capstone and internship reports. The electronic portfolio is regularlyreviewed and assessed by faculty members to monitor student progress and assess theirachievement of various learning outcomes. A course-outcome matrix is developed for programassessment. The matrix includes a list of all IS courses, their learning outcomes and the expectedachievement levels for these outcomes. At the end of a semester, all courses are analyzed fortheir effectiveness in covering various learning outcomes. The results of this analysis are used toidentify courses that seem
2006-2016: TEACHING BUSINESS PROCESS IMPROVEMENTS – MAKING THERIGHT CHOICEFrank Kowalkowski, Knowledge Consultants Frank Kowalkowski is President of Knowledge Consultants Inc., a professional services firm founded in 1984. He has 30 years of management consulting and industry experience in manufacturing, distribution, insurance and financial services as well as the public sector. He has been involved with wide range of projects that include e-commerce, application integration, ERP, change management, content management, benchmarking, business performance measurement, business and competitive intelligence, technology deployment and process improvement. He is the author of a 1996 book on
AC 2007-173: USING DATA MINING TO DETECT INTRUSIONS IN COMPUTERNETWORKSMario Garcia, Texas A&M University-Corpus Christi Page 12.1542.1© American Society for Engineering Education, 2007 Using Data Mining to Detect Intrusions in Computer NetworksAbstractIn recent years Data mining techniques have been applied in many different fields includingmarketing, manufacturing, process control, fraud detection and network management. Over thepast several years a growing number of research projects have applied data mining to variousproblems in intrusion detection. The goal of this research is to design and implement an anomalydetector using data mining. The project
programs.Statistic data in 1998 from Ministry of Education showed that there were 110 instructors ofprofessional faculty including six professors, 76 associate professors, six assistant professors and22 lecturers from departments of information management and departments of businessmanagement. With completing a phased mission of ten-year production automation project by2000, Taiwan-Ministry of Education made a plan of educational development in integration of e-manufacturing and e-commerce to operate in coordination with a scheme of productionautomation and e-business carried out by The Executive Yuan in order to educate talents forlogistics, cash flow, business flow, service flow, and information flow. Further more, there werethree EC-related graduate
andmaintaining a physical lab. It was easier to deploy new projects in virtual environments. Webelieved that virtualization technology had become mature enough and it would help us delivercertain laboratory courses efficiently and effectively.2. Virtualization Software SelectionCurrently there are many different virtualization software packages available, notably VMwareWorkstation, Server, and Fusion (for Mac), Microsoft Virtual PC, Virtual Server and Hyper-V,Sun xVM VirtualBox, Parallels Workstation and Desktop (for Mac), QEMU and Xen.QEMU and Xen are open source projects and are released under GNU General Public License(GPL). However, they are not as user friendly as some other virtualization applications. Xen canonly run under Linux/UNIX systems with
, Information Technology, Global Awareness, Teamwork, and Leadership.During their last semester students need to participate in the internship program and complete acapstone project. Page 13.27.3The ZULOs, which form the framework for the APM, are designed to help students develophigher order intellectual abilities needed for lifelong learning and success. All students mustdemonstrate accomplishments in the following ZULOs before they graduate: Information Literacy and Communication (ILC): Students who graduate will be able to recognize information needs, access and evaluate appropriate information to answer those needs, and communicate
imaging systems, this approachrequires no additional capital hardware or administration load on the department, and alsodoesn’t require download latency before beginning to work on an assignment. Finally, portabledrives allow students to learn through completely administering their own systems, unlikeoperating system-level virtual servers.ObjectivesGoing in to this project, there were several development objectives that we strove to meet. Theseobjectives were determined by the associated web development course, but the researchperformed has a much broader applicability. Page 12.878.3One of the most challenging aspects of developing a software
while serving in these roles and as the Director of the National Technology Training Center for the K-12 program and pre-engineering program Project Lead The Way.Brian Tomaszewski, RIT Dr. Tomaszewski is a Geographic Information Scientist whose research interests in the domains of Cartorgraphy, Geovisual Analytics, Geographic Information Retrieval, Context Modeling and Representation, Geocollaboration, and Disaster Management are targeted at developing web-based, collaborative geovisual analytic tools and computational procedures for contextualizing disaster situations through diverse forms of information. His relevant experience includes past work as a special consultant for the United Nations
: Internet Security (formerly CIS 499) · CIS 481: Computer Forensics · GBA 685: MSBA Project-Adv Computer ForensicsThe college Mt. San Antonio also offers a network security certificate program with 3 courses:CISS 21: Network Vulnerabilities and CountermeasuresCISS 23: Network Analysis and Network Intrusion Detection SystemCISS 25: Network Security and FirewallsBase on the curriculum of the other colleges and departments listed here (and also the curriculamentioned in the ASEE papers), a good information assurance curriculum (or major, focus,option) consists of the following six courses. Note the core courses on OS, Network, andProgramming are also what the authors of reference 1 mentioned in the first paragraph
considering classroom use of emerging cloud capabilities.History of Cloud ComputingThe concept of cloud computing began in the nineteen-sixties as technologies to connectcomputers to each other and enable them to transfer data back and forth were just beginning toemerge. Even before the first two computers were connected together to exchange data, JosephCarl Robnett Licklider, the director of Behavioral Sciences Command and Control Research forthe Advanced Research Projects Agency (ARPA), envisioned a shared computer network. Hisvision went far beyond what would begin as ARPANET and later evolve into the Internet, and Page 15.150.2his vision also
, 2010 Mobile and Wireless Networks Course Development with Hands- on LabsAbstractRapid advances in wireless networks technologies present opportunities for innovative educationat undergraduate and graduate level. Wireless networks courses become increasingly popular incolleges (including community colleges) and universities. However, there is a real concern withthe lack of hands-on labs based active learning in computer science, engineering and technologycurriculums. Hands-on project based learning is found to be the best way of learning andteaching wireless networking technologies. These hands-on projects also provide the problembased learning (PBL).In this paper, an undergraduate computer information
2006-2586: E-STADIUM: REAL-TIME GAME STATISTICS, HIGHLIGHTS, ANDENTERTAINMENTRonald Glotzbach, Purdue University Ronald J. Glotzbach is an Assistant Professor for the Interactive Multimedia Development area in the Department of Computer Graphics Technology at Purdue University’s West Lafayette campus. He is also the Purdue football e-Stadium Project Manager for ITaP. Ronald’s research interests include leading-edge technologies that expand the boundaries of dynamic and interactive content delivered and collaborated on via the graphical communication tool that is the web. Related interests include web-enabling software, dynamic content delivery methods, programming graphics, and integration
Based UnitsIntel Education informs that:Authentic project work puts students in the driver's seat of their own learning. Itis important that instructors take advantage of curriculum developed by teachersin a large collection of Unit Plans that integrate technology. Models ofmeaningful classroom projects that integrate instruction in thinking skills alongwith tools and strategies for developing one’s own exemplary technology-supported learning are always encouraged. They focus on three areas:1. It is important to learn how project-based units can effectively engage students in meaningful work and promote higher-order thinking.2. It is necessary to see how questions and ongoing assessment keep project work focused on important learning goals
Science from the University of Kansas in 2005.Harpal Dhillon, Excelsior College Dr. Harpal Dhillon is currently the Dean of the School of Business and Technology at Excelsior College. In the past he has taught undergraduate and graduate Courses in Information Systems, Software Engineering, and Project Management at University of Maryland, Southwestern Oklahoma State University, and George Washington University. Dr. Dhillon worked as owner/senior executive in three systems engineering companies over a period of 20 years. His research interests are in the areas of Human-Computer Interaction, Quality Assurance, and Applications of IT in Telemedicine and Web-based Distance Learning. Dr. Dhillon is a
what pagesthey can edit, but usually each page can be edited by multiple students and/or each student canedit multiple pages. This makes assessment a challenge, since it is difficult to keep track of thecontributions of each student. Several assessment strategies have been proposed. To ourknowledge, this is the first attempt to compare them. We study the assessment strategies used insix North Carolina State University classes in Fall 2007, and offer ideas on how they can beimproved.1. IntroductionAs an instructional medium, wikis have many advantages. Their collaborative nature enables aclass to tackle projects larger than a single individual could attempt. The ability of students toview their colleagues' work allows cross-fertilization of
, project management, and Cisco systems networking solutions. He holds a MBA from Wayland Baptist University. He also holds various industry certifications to include; A+, Network+, MCSE, MOUS, and CCNP.Philip Lunsford, East Carolina University Phil Lunsford received a B.S. in Electrical Engineering and a M.S. in Electrical Engineering from Georgia Institute of Technology and a Ph.D. in Electrical Engineering from North Carolina State University. He is a registered professional engineer and is currently an Assistant Professor at East Carolina University. His research interests include system simulation, telemedicine applications, and information assurance.Chip Popoviciu, Cisco Systems, Inc
timestamps on everything provides anautomatic documentation of when actions occurred.Don’t delete data – flag items as inactiveProper software development says that data should never get deleted, but this recommendationhas more to do with good research technique. By specifying data as active or inactive, you willbe able to reconstruct a more complete sequence of events as they occurred. Much like therecommendation to timestamp everything, it will also help in developing a write-up of theresearch if there is a guarantee that no data is missing.Have a change management planRecognizing that projects evolve and interfaces and questions change throughout the life of aresearch project, having a change management plan in place to prepare for those
team at Whirlpool Corporation in Benton Harbor, MI. His responsibilities include penetration testing their network, conducting internal IT audits for Sarbanes-Oxley compliance, investigating computer-related security incidents, and providing security consulting for on-going projects. Raheel holds a Masters of Science degree specializing in Information Security and a Bachelors of Science degree, with distinction, in Telecommunications and Networking from Purdue University, West Lafayette, IN.Anthony Smith, Purdue University Anthony H. Smith is an assistant professor with the Computer and Information Technology Department at Purdue University. He has more than 15 years of experience in
experience while updating critical data sources in the community.This service-oriented student project differs from others in that it is ongoing, designed tocontinue into subsequent academic terms with new student teams building upon theirpredecessors work. This project was made possible by employing the focus group and contentanalysis methodologies. These research methodologies permit a high realism of context and thusenabled the researchers to gain a substantive understanding of the problem area. This led toidentifying both the problem of not having critical data and information after a disaster but alsothe problem of not having the resources to ensure the availability of this data and information.These two problems are simultaneously addressed by
topic, for discussion and have the students respond to the topic withina specified period of time. Similar to being in a chatroom, the instructor will monitor the Page 15.112.10discussion for content and appropriateness. Figure 4. A screen shot of IVHPS displaying the diagnostic reportInternet assignment units: Detailed information presented in this unit can reduce the classroomtime allocated to technical and project support which, in turn, allows greater depth and breadth oftopics to be covered in class.Tutorial unit: The tutorial unit is the realization of van Hiele’s five-levels of thought to learningcomputer programming. The
Engineering and Technology, National University, San Diego, USA. He is a lead faculty for MSc in Database Administration and MSc in Computer Science programs. Dr. Wyne has a Ph.D. in Computer Science, M.Sc. in Engineering and B.Sc., in Electrical Engineering. He has been in academics for 20+ years and supervised over 50 graduate and undergraduate projects. Dr. Wyne is with the Accreditation Board of Engineering and Technology (ABET), USA for more than 8 years and is currently serving as a program evaluator for Computer Science Program and Information Systems Program. In addition, he is a guest editor for a journal, associate editor and serving on editorial boards for four international journals
. Gehringer North Carolina State University efg@ncsu.eduAbstractThis paper is a survey of dozens of active and collaborative learning strategies that have beenused in teaching computing. The most basic are “think-pair-share” exercises, where studentsthink about a problem, discuss it with their neighbors, and then share it with the rest of the class.Teams may work together in class to solve problems, with the instructor providing writtencomments. Bringing competition into the picture always helps motivate students, e.g., havingfinal projects compete against each other (e.g., a prey/predator game), or playing a Jeopardy-likegame to review for an exam. Many such activities can be
undergraduates were asuccess. The motivation of the students is the most important reason for this. This project hasdemonstrated that it is quite feasible to give undergraduate students the benefit of expert teaching skillsthat are otherwise unavailable to them. Indeed the author feels privileged to have had this opportunity.1 M. Brorsson. MipsIt-a simulation and development environment using animation forcomputer architecture education. In Proceedings of 2002 Workshop on ComputerArchitecture Education, pages 65-72, May 2002. Anchorage, Alaska. Page 13.444.5
method for publishing that could eventually generate rev-enues similar or greater than those for textbook authors without the need to locate a publisher anddo all related activities, such as promotion. It also eliminates the need to maintain page counts oradhere to traditional book formats. In simple terms it allows us to spend our time generating con-tent as academics, share it with people freely, but still generate income from our works. Page 15.67.7References1. Jack, H, “Engineer on a disk”, http://engineeronadisk.com2. MIT Open Course Ware, http://ocw.mit.edu3. Merlot Open Textbook Projects, http://taste.merlot.org/opentextbooks.html4
curriculum development effortsonto the institutionally recognized reward system – typically published research and grants.The goals of this research project and report are more modest. They are to reliably evaluate some Page 15.1109.2current practices, using recognized educational theoretical bases so that the current situation canbe understood in an instructional design context and key indicators of the design process can beidentified and that methods of improvement can be based on a correct understanding of theinfluences at work in the process. A deeper understanding of what is happening will create afoundation upon which future designs or
create their own projects. Several students have extendedthe class activities to demonstrate other software such as TrueCrypt. As the class evolves,our anticipation is that it the utilization of Open Source Software will contribute to theclass becoming more project orientated.Bibliographic Information1. Dark, M, Morales, L, Justice, C, A Methodology for Developing and Disseminating Curriculum Resource material in Information Security, CISSE 2005.2. FIPS PUB 140-2: Security Requirements for Cryptographic Modules, National Institute of Standards and Technology, May 25 20013. Kar, D, Teaching Cryptography in an Applied Computing Program, Journal of Computing Sciences in Colleges, 2006.4. Mel, H, Baker, D, Cryptography, Decrypted
. , an Step 13 Locate and open the appropriate evaluation assignment with a discussion board deliverable, a submission tool (e.g., email, discussion board, drop project assignment with a due date several weeks box, survey, quiz) in WebCT. away). Step 14 Use WebCT tool interface to submit evaluationStep 7 Review the list to determine the number and nature assignment content and return to Step 5 until all of interaction evaluation activities for the week (e.g., nodes are examined. an online quiz). Step 15 Return with goal
utilization by consolidating demand forunderutilized services. Each of the smaller companies would have an individualdemand for certain services such as tech support maintenance. They would need toemploy a minimum number of people to provide the service and enough excess tohandle peak demand. By pooling these services, resources would likely be larger thanan individual company’s resources but smaller than the sum total of the individualgroups. Also by averaging the demand of several projects, peak resource requirementscan potentially be minimized. For example, if a company has daily need of 20 units ofcomputing power but a peak of 50 units on certain days of the year. They would haveto be capable of handling the 50 units plus some margin for error at
appointment at Purdue, Kyle worked for 16 years as a software engineer and developed systems for such industries as banking, telecommunications, publishing, healthcare, athletic recruiting, retail, and pharmaceutical sales.Alka Harriger, Purdue University Alka Harriger joined the faculty of the Computer and Information Technology Department (CIT) in 1982 and is currently a Professor of CIT and Assistant Department Head. Professor Harriger's current interests include reducing the IT gender gap, web application development, and service learning. Since January 2008, she has been leading the NSF-ITEST SPIRIT project that seeks to rekindle enthusiasm for information technology disciplines as a career