Asee peer logo
Displaying all 6 results
Conference Session
DB & Information Integration
Collection
2006 Annual Conference & Exposition
Authors
Phillip Wilson, Texas A&M University-Corpus Christi; John Fernandez, Texas A&M University-Corpus Christi
Tagged Divisions
Information Systems
, interest, surprise,contempt, disgust, shame, fear, anger, distress, sadness, and anxiety. Richard Lazarus (ascited in Priesmeyer et al.15) confirmed many of the basic emotions in this list through hisown research and provided much discussion about the interaction of emotions thatdirectly contributed to the interpretation and analysis of emotional dynamics in theEmogram system. An important step in the development of Emogram was the creation ofprecise photographs depicting varying degrees of the eleven basic emotions.The Emogram system provides measures of each of the emotions by combining responsesto low, medium, and extreme expressions of each. It also computes an overall EmotionalQuality (E-Quality) score that reflects the overall emotional
Conference Session
Internet and Distributed Computing
Collection
2006 Annual Conference & Exposition
Authors
Philip Lunsford, East Carolina University; Lee Toderick, East Carolina University; Daniel Brooker, East Carolina University
Tagged Divisions
Information Systems
. Page 11.110.7 • Attacks based on timing are difficult to accurately emulate. • Network size is limited. • The large file sizes associated with virtual machines effects the file server performance.A configuration similar to Figure 5 using AMI MegaRACK IP-KVM switches, aWindows-based laboratory host OS, and VMWare Workstation version 5 was used toteach an advanced network security course with 21 students during the fall semester of2005 and used only two lab PCs. Remote laboratory access was available 24/7. Informalstudent surveys indicated general student acceptance and success. Formal assessmentstudies that reflect student learning, remote lab comfort level, and hardware usage will bepublished as data is
Conference Session
Computing Curriculum
Collection
2006 Annual Conference & Exposition
Authors
Alan Price, DeVry University-Pomona
Tagged Divisions
Information Systems
that all the various labels and descriptors for cognitive style could be grouped into twoorthogonal and bipolar dimensions: information processing and information coding. Commondescriptors along the information-processing dimension include Riding’s wholist/analytic,Allinson and Haye’s intuition-analysis, Kirton’s adaptor-innovator, and Witkin’s fielddependence-independence divisions of cognitive style. Each refers to the preferred way anindividual processes information 11. The second dimension identified by Riding is the verbal-imager dimension. This dimension reflects how individuals perceive or mentally codeinformation. Both dimensions are mutually exclusive and position on one dimension does notaffect position on the other.Differences
Conference Session
Computing Curriculum
Collection
2006 Annual Conference & Exposition
Authors
Michael Bailey, Brigham Young University; Barry Lunt, Brigham Young University; Gordon Romney, Brigham Young University
Tagged Divisions
Information Systems
in advancing computationtechnology. “The field is the product of the convergences of various disparate disciplinesand activities: library science, computer science (and its antecedent punched-cardtechnology), documentation of research and development, abstracting, indexing,communications science, behavioral science, micro- and macro-publishing, and video andoptical science, among others.”10 In the years since this has been written, this perspectiveof the inclusiveness of IS has perhaps become even broader.The origins of these programs reflect the discipline’s breadth. For example, a 1972 paperfrom Ohio State speaks of the Computer and Information Science department existent at
Conference Session
DB & Information Integration
Collection
2006 Annual Conference & Exposition
Authors
Ed Crowley, University of Houston; Cheryl Willis, University of Houston
Tagged Divisions
Information Systems
isproblematic.This paper describes elements of a methodology for creating hands-on lab activities thatminimize budget and support requirements. We have used this methodology to create hands-onactivities in Operating System, Networking, and Security contexts. These activities providestudents with concrete experience that the student can, in most cases, duplicate and extendoutside of the laboratory environment. These structured activities are accompanied by questionsand assignments that provoke reflection and stimulate critical thinking.Our experience has been that Open Source Tools and Live CDs are critical elements in thedesign of our hands-on learning activities. These two elements produce a synergy that facilitatesthe creation of learning experiences that
Conference Session
Computing Curriculum
Collection
2006 Annual Conference & Exposition
Authors
Frank Kowalkowski, Knowledge Consultants; Gilbert Laware, Purdue University
Tagged Divisions
Information Systems
implementation plan.The ImplicationsThe bottom line in this approach is that it provides an agile and essential Business ProcessManagement (BPM) analysis that is useful to sort out the processes for improvement. As in thisexample consider capturing the context envelope about who, what, where, when, how, and whysomething is needed with sufficient detail so that it can be engineered. This is the data about theorganization and this is referred to as the organization’s metadata. It is always part of thefundamental requirements. (Laware, 1993) These descriptive statements reflect the current ordesired needs by providing specific organizational data about who, what, where, when, how, andwhy something is needed. We can see that this information (location