- Conference Session
- Computing Curriculum
- Collection
- 2006 Annual Conference & Exposition
- Authors
-
Akram Al-Rawi, Zayed University; Azzedine Lansari, Zayed University; Faouzi Bouslama, Zayed University
- Tagged Divisions
-
Information Systems
. However, they differ in some topics such as CCNA certificate requiredetailed knowledge about Cisco Internetwork Operating System (IOS), while Network+certificate require broader knowledge about different network operating systems. The advantagesand disadvantages of integrating IT certificates in the IS curriculum along with other integrationissues have been addressed by few authors1,2,5,6.2.1 Network+The CompTIA Network+ certification is an international industry credential that validates the Page 11.787.3knowledge of networking professionals. Acquiring the Network+ certificate is equivalent to atleast nine months of experience in network support
- Conference Session
- Computing Curriculum
- Collection
- 2006 Annual Conference & Exposition
- Authors
-
Barry Lunt, Brigham Young University; Joseph Ekstrom, Brigham Young University
- Tagged Divisions
-
Information Systems
2006-960: CHANGING TIMES: THE STATUS OF COMPUTING EDUCATION INTHE UNITED STATESBarry Lunt, Brigham Young University Barry M. Lunt is an Associate Professor of Information Technology at Brigham Young University in Provo, UT. Dr. Lunt received a B.S. and an M.S. degree in EET from BYU, and a Ph.D. in Occupational and Adult Education from Utah State University in Logan, UT. He has spent seven years in industry as a design engineer, and 19 years in engineering technology education. His present research emphases are the physical design of electronic circuits and systems, IT curriculum, and engineering technology education.Joseph Ekstrom, Brigham Young University Joseph J. Ekstrom (Ph. D
- Conference Session
- Computing Curriculum
- Collection
- 2006 Annual Conference & Exposition
- Authors
-
Alan Price, DeVry University-Pomona
- Tagged Divisions
-
Information Systems
veracity of data needed to build a user model.Information acquisition and verification may be difficult if users are neither interested norwilling to provide the required information needed by an adaptive hypermedia system 26.The investigation attempts to offer a new approach for the autonomous computer-basedassessment of a user’s preferred cognitive style required for effective user modeling in adaptivehypermedia systems. The research bridges work in the fields of computer science, psychology,and information science in order to: • Make a contribution to the field of computer science by integrating cognitive style theory Page 11.251.5 and
- Conference Session
- Computing Curriculum
- Collection
- 2006 Annual Conference & Exposition
- Authors
-
Frank Kowalkowski, Knowledge Consultants; Gilbert Laware, Purdue University
- Tagged Divisions
-
Information Systems
Enterprise Analysis (Prentice – Hall, ISBN 0-13-282-3365) and over 70 papers. Frank has been the keynote speaker as well a conference chair at several conferences. He conducts frequent seminars nationally and internationally on a variety of business management and information technology topics.Gilbert Laware, Purdue University Gil Laware is an Associate Professor at Purdue University in Computer Information & Technology department. He has over 30 years of consulting and industry experience in projects that span world-wide data management and web/database solutions, business process and knowledge management, and enterprise application integration. He is the Vice President of Research
- Conference Session
- Internet and Distributed Computing
- Collection
- 2006 Annual Conference & Exposition
- Authors
-
Shelton Houston, University of Southern Mississippi; Christopher Herrod, University of Southern Mississippi; Steven Blesse, University of Southern Mississippi
- Tagged Divisions
-
Information Systems
allow 24 hour laboratoryaccess to students in a Cisco CCNP curriculum. IT programs that are associated with theCisco Networking Academy Program may want to consider this type of implementationif student laboratory access is a recurring problem or if a larger number of students arecommuters. Overall, student feedback was very positive. More importantly, the numberof student complaints related to laboratory access was reduced to zero.If an institution considers, any type of distance learning extension, student ethics cannotbe overlooked. A system of checks & balances should be incorporated to insure thatstudents are actually performing assignments
- Conference Session
- Security
- Collection
- 2006 Annual Conference & Exposition
- Authors
-
Tim Lin, California State Polytechnic University-Pomona; Saeed Monemi, California State Polytechnic University-Pomona
- Tagged Divisions
-
Information Systems
enhancing with the securitycomponents in the last few years.This paper is organized as follows: section 1 as an introduction to discuss the general securityeducation curriculum, section 2 discusses the different stages of security proficiencies theinstructor can teach the students, section 3 talks about the engineering courses that can havesecurity education components, section 4 gives a detailed treatment of security materials inseveral engineering courses, and section concludes the security education with future efforts.2. Stages of Security Proficiency for the Students Page 11.1109.3Though security education has aroused widespread interests and the