Asee peer logo
Displaying results 61 - 90 of 93 in total
Conference Session
Information and Network Security
Collection
2010 Annual Conference & Exposition
Authors
Hetal Jasani, Northern Kentucky University
Tagged Divisions
Information Systems
, 2010 Mobile and Wireless Networks Course Development with Hands- on LabsAbstractRapid advances in wireless networks technologies present opportunities for innovative educationat undergraduate and graduate level. Wireless networks courses become increasingly popular incolleges (including community colleges) and universities. However, there is a real concern withthe lack of hands-on labs based active learning in computer science, engineering and technologycurriculums. Hands-on project based learning is found to be the best way of learning andteaching wireless networking technologies. These hands-on projects also provide the problembased learning (PBL).In this paper, an undergraduate computer information
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2008 Annual Conference & Exposition
Authors
Azzedine Lansari, Zayed University; Akram Al-Rawi, Zayed University; Abdallah Tubaishat, Zayed Univeristy; Faouzi Bouslama, Université Laval
Tagged Divisions
Information Systems
, UAE. He has worked at several academic institutions of which the last two were the University of Missouri-Columbia and Columbia College, MO. His teaching interests include programming languages, logic design, and computer architecture. His research interests include computer simulation, web-caching architecture, and curriculum design.Abdallah Tubaishat, Zayed Univeristy Dr. Abdallah Tubaishat received his PhD degree in Software Engineering from Illinois Institute of Technology. He is conducting research that spans two main areas, one is technical: software engineering and the other is non-technical: e-learning. He is conducting both types of research in parallel and has presented his work
Conference Session
Internet and Distributed Computing
Collection
2006 Annual Conference & Exposition
Authors
Philip Lunsford, East Carolina University; Lee Toderick, East Carolina University; Daniel Brooker, East Carolina University
Tagged Divisions
Information Systems
2006-559: A REMOTELY CONTROLLED AND ISOLATED COMPUTERNETWORK TEST BED FOR ATTACK UNDERSTANDING BASEDINFORMATION ASSURANCE DISTANCE EDUCATION COURSESPhilip Lunsford, East Carolina University Phil Lunsford received a B.S. in Electrical Engineering and a M.S. in Electrical Engineering from Georgia Institute of Technology and a Ph.D. in Electrical Engineering from North Carolina State University. He is a registered professional engineer and is currently an Assistant Professor at East Carolina University. His research interests include system simulation, telemedicine applications, and information assurance.Lee Toderick, East Carolina University Lee Toderick received a B.S. in Computer Science from
Conference Session
DB & Information Integration
Collection
2006 Annual Conference & Exposition
Authors
Ronald Glotzbach, Purdue University; Nathan Bingham, Purdue University; Meiqi Ren, Purdue University; Dorina Mordkovich, Purdue University
Tagged Divisions
Information Systems
2006-2586: E-STADIUM: REAL-TIME GAME STATISTICS, HIGHLIGHTS, ANDENTERTAINMENTRonald Glotzbach, Purdue University Ronald J. Glotzbach is an Assistant Professor for the Interactive Multimedia Development area in the Department of Computer Graphics Technology at Purdue University’s West Lafayette campus. He is also the Purdue football e-Stadium Project Manager for ITaP. Ronald’s research interests include leading-edge technologies that expand the boundaries of dynamic and interactive content delivered and collaborated on via the graphical communication tool that is the web. Related interests include web-enabling software, dynamic content delivery methods, programming graphics, and integration
Conference Session
Information and Network Security
Collection
2008 Annual Conference & Exposition
Authors
Peng Li, East Carolina University; Tijjani Mohammed, East Carolina University; Lee Toderick, East Carolina University; Chengcheng Li, East Carolina University; Philip Lunsford, East Carolina University
Tagged Divisions
Information Systems
AC 2008-1682: A PORTABLE VIRTUAL NETWORKING LAB FOR IT SECURITYINSTRUCTIONPeng Li, East Carolina UniversityTijjani Mohammed, East Carolina UniversityLee Toderick, East Carolina UniversityChengcheng Li, East Carolina UniversityPhilip Lunsford, East Carolina University Page 13.80.1© American Society for Engineering Education, 2008 A Portable Virtual Networking Lab for IT Security InstructionAbstractInformation and computer technology programs are facing several challenges such as rapiddevelopments of technologies, outdated lab equipment and materials, and increasing demands forremote labs from on-campus and distance education (DE) students. The purpose of this paper
Conference Session
Computing Curriculum
Collection
2006 Annual Conference & Exposition
Authors
Akram Al-Rawi, Zayed University; Azzedine Lansari, Zayed University; Faouzi Bouslama, Zayed University
Tagged Divisions
Information Systems
Azzedine received a PhD in Biomedical Engineering from North Carolina State University in 1992. From 1992-1998, he was a senior researcher at MANTECH, NC. He joined Zayed University in August 1998. Currently he is an assistant professor of Information systems. His research interests include systems model-ing, educational technology and curriculum design in Information Systems. His teaching interests include instructional technology and statistical modeling.Faouzi Bouslama, Zayed University Faouzi received a PhD in Electronics Engineering from Shizuoka University, Japan, in 1992. From 1992-1994, he was a researcher at Toshiba Co., Tokyo. From 1994-2000, he was Associate Professor of
Conference Session
Information and Network Security
Collection
2010 Annual Conference & Exposition
Authors
Alireza Kavianpour, DeVry University; Ricardo Monterrosa, DeVry University; Rammy Badran, DeVry University
Tagged Divisions
Information Systems
AC 2010-679: AUTOMATED LUGGAGE TRACKING SYSTEMAlireza Kavianpour, DeVry University Dr. Alireza Kavianpour received his PH.D. Degree from University of Southern California (USC). He is currently Senior Professor at DeVry University, Pomona, CA. Dr. Kavianpour is the author and co-author of over forty technical papers all published in IEEE Journals or referred conferences. Before joining DeVry University he was a researcher at the University of California, Irvine and consultant at Qualcom Inc. His main interests are in the areas of embedded systems and computer architecture.Ricardo Monterrosa, DeVry University Ricardo Monterrosa is a Computer Engineering Technology graduate from DeVry
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2009 Annual Conference & Exposition
Authors
Akram Al-Rawi, McKendree University; Azzedine Lansari, Zayed University
Tagged Divisions
Information Systems
. Page 14.447.1© American Society for Engineering Education, 2009 Developing an Effective Network Course Using the Cisco CCNA Exploration CurriculumAbstractUndergraduate Computer Science (CS), Information Technology/Information Systems (IT/IS)curricula in many US Universities and Colleges only include one course in networking. Thiscourse, usually called Networking and Data Communications, varies in content and focus.Moreover, a number of popular textbooks lack in scope and content, and sometimes do not evenaddress the basics of networking or how networks operate. The Cisco Networking AcademyCCNA Exploration curriculum offers in-depth theory, challenging labs, and a detailed overviewof protocol operations. It
Conference Session
Laboratory and Internship Innovations in IT/IS
Collection
2007 Annual Conference & Exposition
Authors
Shelton Houston, University of Southern Mississippi; Billy Walters, University of Southern Mississippi; Tulio Sulbaran, University of Southern Mississippi
Tagged Divisions
Information Systems
AC 2007-1013: KATRINA – AN INTERNSHIP OPPORTUNITYShelton Houston, University of Southern Mississippi Dr. Houston is a professor in the School of Computing at the University of Southern Mississippi. Dr. Houston has been involved in engineering technology education for 27 years. and has 10 years consulting experience in personal computer systems.Billy Walters, University of Southern Mississippi Prof. Walters holds a Masters of Science degree in Computer Science from The University of Arizona. Prof. Walters’ career includes academic and professional appointments. He has experience working at the Johnson Space Center, with secure government contractors, and directing law enforcement
Conference Session
POTPOURRI
Collection
2010 Annual Conference & Exposition
Authors
Edward Gehringer, North Carolina State University
Tagged Divisions
Information Systems
AC 2010-1150: ONLINE VS. ON-PAPER EXAMSEdward Gehringer, North Carolina State University Ed Gehringer, efg@ncsu.edu, is Associate Professor of Computer Science and Computer Engineering at North Carolina State University. His main research area is collaborative learning technology. He received his Ph.D. degree from Purdue University, and taught at Carnegie Mellon University, and Monash University in Australia. Page 15.927.1© American Society for Engineering Education, 2010 Online vs. On-Paper ExamsAbstractAs information and education continue to migrate to an online format, on
Conference Session
Internet and Distributed Computing
Collection
2006 Annual Conference & Exposition
Authors
Shelton Houston, University of Southern Mississippi; Christopher Herrod, University of Southern Mississippi; Steven Blesse, University of Southern Mississippi
Tagged Divisions
Information Systems
industry experience. Mr. Herrod’s current teaching and research include client-server networking, internetworking, and information security. He has obtained the CompTIA A+ certification, Cisco Certified Network Associate, and Cisco Certified Academy Instructor.Steven Blesse, University of Southern Mississippi Mr. Blesse is an instructor in the School of Computing at the University of Southern Mississippi. He has a M.S. in Engineering Technology from the University of Southern Mississippi and has 14 years of industry and military experience. Mr. Blesse’s current teaching and research include client-server networking and network management, network security and penetration testing, and
Conference Session
Laboratory and Internship Innovations in IT/IS
Collection
2007 Annual Conference & Exposition
Authors
Ed Crowley, University of Houston
Tagged Divisions
Information Systems
AC 2007-2819: DEVELOPING BASIC CRYPTOGRAPHY LAB MODULES WITHOPEN SSLEd Crowley, University of Houston Page 12.490.1© American Society for Engineering Education, 2007 Developing Basic Cryptography Lab Modules with OpenSSLPerceived topic: Innovative TeachingKeywords: Security, Cryptography, Open Source, Lab Development, NetworkingWhile there has been a recent proliferation of quality cryptography texts, there remains ashortage of quality applied laboratory exercises and related support materials. In part, thisis due to the cost and availability of commercial cryptographic software. In part, this isdue to the time and resource commitment required to develop laboratory
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2007 Annual Conference & Exposition
Authors
Azzedine Lansari, Zayed University; Akram Al-Rawi, Zayed University; Faouzi Bouslama, Université Laval
Tagged Divisions
Information Systems
AC 2007-1558: ASSESSING THE EFFECTIVENESS OF AN OUTCOME-BASEDINFORMATION SYSTEMS CURRICULUMAzzedine Lansari, Zayed University Azzedine received a Ph.D. in Bioengineering from North Carolina State Uni-versity in 1992. From 1992-1998, he was a senior researcher at Computer Sciences Corp. and MANTECH, Inc. He joined Zayed University in August 1998. Currently he is an assistant professor of Information Technology. His teaching interests include instructional technology and statistical modeling. His research interests include systems modeling, educational technology and curriculum design in Information Systems.Akram Al-Rawi, Zayed University Akram is a Professor of Conputer Science at King
Conference Session
Information and Network Security
Collection
2008 Annual Conference & Exposition
Authors
Richard Smith, U. of St. Thomas - St. Paul
Tagged Divisions
Information Systems
and assistance. Iwould also like to acknowledge the input and recommendations of colleagues who participatedin the University of Minnesota Summer School for Information Assurance, notably Dr.Youngdae Kim and Dr. Nick Hopper.Bibliography1. Anderson, Ross (2001). Security Engineering, John Wiley, New York.2. Association for Computing Machinery (2005). Computing curricula: information technology volume.Association for Computing Machinery. October 2005.3. Bishop, Matt (2005). Introduction to Computer Security, Addison Wesley, Boston.4. Bloom, B.S. (1956). Taxonomy of educational objectives; Book 1: Cognitive domain. Longman, New York.5. Fuller, U., Johnson, C., Ahoniemi, T., Cukierman, D., Hernan-Losada, I., Jackova, J., Lahtinen, E., Lewis, T
Conference Session
Security
Collection
2006 Annual Conference & Exposition
Authors
Mario Garcia, Texas A&M University-Corpus Christi
Tagged Divisions
Information Systems
2006-287: BIOMETRIC AUTHENTICATION TOOL FOR USER IDENTIFICATIONMario Garcia, Texas A&M University-Corpus Christi Page 11.277.1© American Society for Engineering Education, 2006 Biometric Authentication Tool for User Identification Based on Keystroke DynamicsAbstractBiometric access methods for computer systems are gaining popularity because of governmentaland corporate businesses' increased focus to secure sensitive data on computer systems andnetworks. Biometrics is the science of measuring a unique physical characteristic about anindividual as an identification mechanism. Keystroke Biometrics is a relatively new method
Conference Session
Computing Curriculum
Collection
2006 Annual Conference & Exposition
Authors
Alan Price, DeVry University-Pomona
Tagged Divisions
Information Systems
2006-754: ASSESSMENT OF COGNITIVE STYLE PREFERENCE THROUGHCLICK-STREAM ANALYSIS OF EDUCATIONAL HYPERMEDIA USER CHOICEAND BROWSING PATTERNS: A CONCEPTUAL MODELAlan Price, DeVry University-Pomona Alan Price is the Associate Dean of Technology Programs at DeVry University, Pomona campus. He holds a Masters of Engineering degree from Cornell University and he is currently working on his Ph.D. in Management of Information Systems from Claremont Graduate University. His research interest include security of wireless sensor networks and effective learning and pedagogical support through use of adaptive hypermedia technologies
Conference Session
DB & Information Integration
Collection
2006 Annual Conference & Exposition
Authors
Reza Sanati-Mehrizy; Curtis Welborn, Utah Valley State College; Afsaneh Minaie, Utah Valley State College
Tagged Divisions
Information Systems
2006-1628: REPRESENTING AND ENFORCING BUSINESS RULES INRELATIONAL DATA MODELReza Sanati, Utah Valley State College REZA SANATI MEHRIZY is an associate professor of the Computing and Networking Sciences Dept. at Utah Valley State College, Orem, Utah. He received his MS and PhD in Computer Science from University of Oklahoma, Norman, Oklahoma. His research focuses on diverse areas such as: Database Design, Data Structures, Artificial Intelligence, Robotics, and Computer Integrated Manufacturing.Curtis Welborn, Utah Valley State CollegeAfsaneh Minaie, Utah Valley State College AFSANEH MINAIE is an associate professor in the Engineering Department at Utah Valley State College. She received a B.S
Conference Session
Information and Network Security
Collection
2010 Annual Conference & Exposition
Authors
HongLi Luo, Indiana University-Purdue University, Fort Wayne
Tagged Divisions
Information Systems
AC 2010-1836: ENHANCING LEARNING IN DATA COMMUNICATION ANDNETWORKING WITH HOME NETWORKHongLi Luo, Indiana University-Purdue University, Fort Wayne Page 15.511.1© American Society for Engineering Education, 2010 Enhancing Learning in Data Communication and Networking with Home Network1. IntroductionData communication and networking is provided as an introductory course to get the studentsfamiliar with the concepts and technologies in computer networking. It covers a wide range oftechnologies and protocols in the network, which makes the hands-on practice necessary for thelearning of this course. It is challenging to build a real network with
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2009 Annual Conference & Exposition
Authors
Reza Sanati-Mehrizy, Utah Valley State College; Floyd Wilkes, Utah Valley University; Afsaneh Minaie, Utah Valley University
Tagged Divisions
Information Systems
. Refrences1. Floyd Wilkes and Reza Sanati Mehrizy , “An International Study of the Coverage of Relational, Object- Relational and Object-Oriented Database Concepts in Database Textbooks and a Database Example Represented in These Database Models”, American Society for Engineering Education (ASEE) Annual Conference, June 2007.2. Reza Sanati Mehrizy and Floyd Wilkes, “A Comparison of Implementing a Single Problem in Relational, Object-Relational and Object-Oriented Database Systems”, American Society for Engineering Education (ASEE) Annual Conference, June 2008.3. http://www.oracle.com/technology/software/products/database/xe/index.html4. http://www.softlist.net/program/db4o-software.html
Conference Session
Security
Collection
2006 Annual Conference & Exposition
Authors
Tim Lin, California State Polytechnic University-Pomona; Saeed Monemi, California State Polytechnic University-Pomona
Tagged Divisions
Information Systems
2006-1831: SECURITY EDUCATIONTim Lin, California State Polytechnic University-PomonaSaeed Monemi, California State Polytechnic University-Pomona Page 11.1109.1© American Society for Engineering Education, 2006 Security EducationAbstract:Network security and computer security are usually hot topics whenever any intrusion incidentscause system crash and loss of work time in big corporations. In engineering colleges howeversecurity is usually a topic with least or incompatible attention.The author has taught many upper division classes in college and also graduate course(s) and hasbeen trying to imbue and enhance the courses with the security
Conference Session
Internet and Distributed Computing
Collection
2006 Annual Conference & Exposition
Authors
Xiannong Meng, Bucknell University; Luiz Perrone, Bucknell University; Maurice Aburdene, Bucknell University
Tagged Divisions
Information Systems
. His research on the application of computer simulation to the study of the security properties of wireless networks is supported by the Office for Domestic Preparedness, U.S. Department of Homeland Security, via the Institute for Security Technology Studies at Dartmouth CollegeMaurice Aburdene, Bucknell University MAURICE F. ABURDENE is the T. Jefferson Miers Professor of Electrical Engineering and Professor of Computer Science at Bucknell University. He has taught at Swarthmore College, the State University of New York at Oswego, and the University of Connecticut. His research areas include, parallel algorithms, simulation of dynamic systems, distributed algorithms, computer
Conference Session
Laboratory and Internship Innovations in IT/IS
Collection
2007 Annual Conference & Exposition
Authors
Michael Bailey, Brigham Young University; Michael Moore, Brigham Young University; Joseph Ekstrom, Brigham Young University
Tagged Divisions
Information Systems
laboratory environment, we imaged the lab machines so that students logged intothe machines using their ID, as managed by the College of Engineering and Technology. Thecustomized login process then created a local user with admin privileges, providing us a binding Page 12.878.6between the student and the IP address for network traceability purposes. Since the studentscontrol the images on the external drive, there is now no way to guarantee that we know who isusing the physical hardware in the lab, and no way to trace network activity back to a student ID.Since traceability is a university requirement, in the long term we must find a solution to
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2009 Annual Conference & Exposition
Authors
Kyle Lutes, Purdue University; Alka Harriger, Purdue University; Jack Purdum, Purdue University
Tagged Divisions
Information Systems
appointment at Purdue, Kyle worked for 16 years as a software engineer and developed systems for such industries as banking, telecommunications, publishing, healthcare, athletic recruiting, retail, and pharmaceutical sales.Alka Harriger, Purdue University Alka Harriger joined the faculty of the Computer and Information Technology Department (CIT) in 1982 and is currently a Professor of CIT and Assistant Department Head. Professor Harriger's current interests include reducing the IT gender gap, web application development, and service learning. Since January 2008, she has been leading the NSF-ITEST SPIRIT project that seeks to rekindle enthusiasm for information technology disciplines as a career
Conference Session
Information and Network Security
Collection
2008 Annual Conference & Exposition
Authors
Barry Cumbie, Auburn University; Chetan Sankar, Auburn University; P.K. Raju, Auburn University
Tagged Divisions
Information Systems
AC 2008-904: THE ROLE OF IT-RELATED DISASTER RECOVERY INEXPEDITING THE RECOVERY FROM HURRICANES IN TOURIST-BASEDCOASTAL COMMUNITIESBarry Cumbie, Auburn UniversityChetan Sankar, Auburn UniversityP.K. Raju, Auburn University Page 13.1261.1© American Society for Engineering Education, 2008 The Role of IT-Related Disaster Recovery in Expediting the Recovery from Hurricanes in Tourist-Based Coastal CommunitiesAbstractWhile proximity to the ocean affords visitors and residents of coastal communities a uniquelifestyle, the threat of coastal storms constantly looms, threatening the economic viability ofthese tourist-based economies. The executive director of community
Conference Session
DB & Information Integration
Collection
2006 Annual Conference & Exposition
Authors
Phillip Wilson, Texas A&M University-Corpus Christi; John Fernandez, Texas A&M University-Corpus Christi
Tagged Divisions
Information Systems
://robotik.inflomatik.info/other/opencv/OpenCV_ObjectDetection_HowTo.pdf, June20 2003.2. Bishop, M., Computer Security, Art and Science,. Massachusetts: Pearson EducationInc., 2003.3. Cristinacce, D. and Cootes, T., Facial feature detection using AdaBoost with shapeconstraints. British Machine Vision Conference, 2003.4. The Facial Recognition Technology (FERET) Database, National Institute ofStandards and Technology, 2003. http://www.itl.nist.gov/iad/humanid/feret/5. Fernandez, J.D., Human-computer interaction closes the software engineering gap,Computers in Education Journal, vol. XV, no. 3, July – September 2005, 96-100..6. Fernandez, J.D., Fernandez, M.A., & Priesmeyer, R., Experimenting with an emotionsmeasurement instrument in usability testing
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2010 Annual Conference & Exposition
Authors
Matthew Verleger, Purdue University; Heidi Diefes-Dux, Purdue University
Tagged Divisions
Information Systems
AC 2010-1815: FACILITATING TEACHING AND RESEARCH ON OPEN-ENDEDPROBLEM SOLVING THROUGH THE DEVELOPMENT OF A DYNAMICCOMPUTER TOOLMatthew Verleger, Purdue UniversityHeidi Diefes-Dux, Purdue University Page 15.575.1© American Society for Engineering Education, 2010 Facilitating Teaching and Research on Open-Ended Problem Solving Through the Development of a Dynamic Computer ToolAbstractModel Eliciting Activities (MEAs) are realistic open-ended problems set in engineering contexts;student teams draw on their diverse experiences both in and out of the classroom to develop amathematical model explicated in a memo to the client. These activities have been implementedin
Conference Session
Information and Network Security
Collection
2009 Annual Conference & Exposition
Authors
Nipul Patel, Purdue University, North Central; Bryan Marshall, Georgia College and State University
Tagged Divisions
Information Systems
AC 2009-1819: EXAMINING THE IMPLICATIONS AND CHALLENGES INCLOUD COMPUTING ENVIRONMENTS: AN EXPLORATORY STUDYNipul Patel, Purdue University, North CentralBryan Marshall, Georgia College and State University Page 14.599.1© American Society for Engineering Education, 2009 EXAMINING THE IMPLICATIONS AND CHALLENGES IN CLOUD COMPUTING ENVIRONMENTS: AN EXPLORATORY STUDYAbstractCommercial enterprises are increasingly utilizing cloud computing as a solution tofluctuating capacity challenges. Cloud computing offers the possibility of on-demandcapacity, allowing commercial enterprises to “tweak” their network infrastructure basedon increased or decreased
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2008 Annual Conference & Exposition
Authors
Henry Chaya, Manhattan College
Tagged Divisions
Information Systems
AC 2008-1245: DISTANCE LEARNING WITH LIMITED BANDWIDTHHenry Chaya, Manhattan College Brother Henry Chaya is an Associate Professor of Electrical and Computer Engineering at Manhattan College in New York City. He is currently on leave to serve as chairperson of the Computer Information Systems department at Bethlehem University in the West Bank. Both institutions are sponsored by the Brothers of the Christian Schools of which the author is a member. Page 13.444.1© American Society for Engineering Education, 2008 Distance Learning with Limited BandwidthAbstractAccess to quality
Conference Session
Information and Network Security
Collection
2009 Annual Conference & Exposition
Authors
Tokunbo Ogunfunmi, Santa Clara University
Tagged Divisions
Information Systems
ASEE. Page 14.682.1© American Society for Engineering Education, 2009 IEEE 802.11n Wireless Local Area Networks Standard: A simulation model of PHY layer of Amendment Draft 3.0Abstract The IEEE 802.11n is a currently emerging Wireless Local Area Network (WLAN) standardcapable of providing dramatically increased throughput, as well as improved range, reducedsignal fading, over the existing IEEE 802.11a/g WLAN standards. These benefits are achievedthrough use of MIMO (Multiple-Input, Multiple-Output) technology. The latest draft for IEEE802.11n describes rates up to 600Mbps, exceeding the maximum rate with the 11a
Conference Session
POTPOURRI
Collection
2010 Annual Conference & Exposition
Authors
Reza Sanati-Mehrizy, Utah Valley University; Paymon Sanati-Mehrizy, University of Pennsylvania; Afsaneh Minaie, Utah Valley University; Chad Dean, Utah Valley University
Tagged Divisions
Information Systems
AC 2010-1357: HOW A DATA MINING COURSE SHOULD BE TAUGHT IN ANUNDERGRADUATE COMPUTER SCIENCE CURRICULUMReza Sanati-Mehrizy, Utah Valley UniversityPaymon Sanati-Mehrizy, University of PennsylvaniaAfsaneh Minaie, Utah Valley UniversityChad Dean, Utah Valley University Page 15.646.1© American Society for Engineering Education, 2010 How a Data Mining Course Should be Taught in an Undergraduate Computer Science CurriculumAbstractData mining is a relatively new area of computer science that brings the concept of artificialintelligence, data structures, statistics, and database together. It is a high demand area becausemany organizations and businesses can benefit