Asee peer logo
Displaying all 4 results
Conference Session
Computing Curriculum
Collection
2006 Annual Conference & Exposition
Authors
Barry Lunt, Brigham Young University; Joseph Ekstrom, Brigham Young University
Tagged Divisions
Information Systems
information management (DB) information systems development intelligent systems (AI) legal/professional/ethics/society networks operating systems programming security software life cycle systems administration
Conference Session
Security
Collection
2006 Annual Conference & Exposition
Authors
Tim Lin, California State Polytechnic University-Pomona; Saeed Monemi, California State Polytechnic University-Pomona
Tagged Divisions
Information Systems
impacts. Have the common sense and knowthe basic procedures to protect the computer from the general attacks. Able to perceive if somesecurity of the computer is compromised.Stage 2: Hands On Capabilities and Experience: able to use the tools, emulate attacks ordefenses, develop software / devices for attack / defense.Stage 3: Professionalism: know the different issues of security such as legal, social, economic,ethical, etc., achieve the technical level of professionals, pursue a career in this profession,conduct professionally (ethically, such as ethical hacking).Most books or courses on security education cover stage 1: statement of knowledge which makesthe students aware of the security issues. It is good for the students to achieve stage 2
Conference Session
Internet and Distributed Computing
Collection
2006 Annual Conference & Exposition
Authors
Shelton Houston, University of Southern Mississippi; Christopher Herrod, University of Southern Mississippi; Steven Blesse, University of Southern Mississippi
Tagged Divisions
Information Systems
faculty decided to limit use of the CNLSsystem to one course for the spring 2005 semester. This would permit faculty time toconfigure the system and test the operation on a pilot class before widespread operationwas implemented.The pilot class selected was the fifth of the CCNP sequence. Fifteen students participatedin the pilot class and had the option of using the CNLS system or laboratory equipment.Few restrictions were implemented in the management software since it was a smallgroup and because the software package was new to the faculty. It was assumed thatstudents would be ethical in using the system and since it was a small group systemadministration would be minimal.All students in the pilot course used the CNLS system, but usage varied
Conference Session
Internet and Distributed Computing
Collection
2006 Annual Conference & Exposition
Authors
Fani Zlatarova, Elizabethtown College
Tagged Divisions
Information Systems
others. (2005). Query by Excel. Proc. of the 31st Intern. Conf. VLDB’05, VLDB Endowment16. Zlatarova, F. (2004). Computing Projects in Liberal Arts College Environment. 33rd International Symposium IGIP/IEEE/ASEE, Fribourg, Switzerland, pp. 113-11817. Zlatarova, F. (2004). Introducing Ethics in Computing Courses and Extra Class Activities. Proc. of the Frontiers in Education Conference, ASEE/IEEE/IEEE Computer Society, Savannah, GA, pp. S1E.6–S1E.9 Page 11.890.10