Asee peer logo
Well-matched quotation marks can be used to demarcate phrases, and the + and - operators can be used to require or exclude words respectively
Displaying results 1 - 30 of 613 in total
Conference Session
Computing and Information Technology Division Technical Session 6
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Peng Li, East Carolina University
Tagged Divisions
Computing and Information Technology
Paper ID #31629Developing Information Technology Labs on Google Cloud PlatformDr. Peng Li, East Carolina University c American Society for Engineering Education, 2020 Developing Information Technology Labs on Google Cloud Platform1. INTRODUCTIONInformation technology is evolving rapidly and instructional material must be adaptedaccordingly. Cloud computing leverages on-demand, efficient resource sharing of a virtualinfrastructure, which allows swift deployment and adaptation of curriculum and laboratoryexperiences in step with the advances in the field. In addition to the in-house cloud-based(private cloud) systems in our
Conference Session
Computing and Information Technology Division Technical Session 4
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Afsaneh Minaie, Utah Valley University; Reza Sanati-Mehrizy, Utah Valley University; Benjamin Chambers
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Paper ID #29732Autonomous Vehicles in Computer Engineering ProgramDr. Afsaneh Minaie, Utah Valley University Afsaneh Minaie is a Professor and Chair of Engineering Department at Utah Valley University. She re- ceived her B.S., M.S., and Ph.D. all in Electrical Engineering from University of Oklahoma. Her research interests include gender issues in the academic sciences and engineering fields, Embedded Systems De- sign, Mobile Computing, Wireless Sensor Networks, Nanotechnology, Data Mining and Databases.Dr. Reza Sanati-Mehrizy, Utah Valley University Reza Sanati-Mehrizy is a professor of Computer Science Department at Utah
Conference Session
Computing and Information Technology Division Technical Session 5
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Alireza Kavianpour, DeVry University, Pomona
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Paper ID #28992Renewable Energy Engineering Technology (REET) ProgramDr. Alireza Kavianpour, DeVry University, Pomona Dr. Alireza Kavianpour received his PH.D. Degree from University of Southern California (USC). He is currently Senior Professor at DeVry University, Pomona, CA. Dr. Kavianpour is the author and co-author of over forty technical papers all published in IEEE Journals or referred conferences. Before joining DeVry University he was a researcher at the University of California, Irvine and consultant at Qualcom Inc. His main interests are in the areas of embedded systems and computer architecture
Conference Session
Computing and Information Technology Division Technical Session 3
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Margaret Ellis, Virginia Tech; Catherine T. Amelink, Virginia Tech; Stephen H. Edwards, Virginia Tech; Clifford A. Shaffer, Virginia Tech
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
they can study more deeply in the future.Students provided detailed positive descriptions of the course in response to the prompt ”Youindicated that this course has or will influence your computer science activities outside of yourcoursework, please explain.”: I learned a lot of cool stuff in this class, especially regarding git and web development. I was able to use the google cloud platform project to my advantage during an interview I had with salesforce. I know more about computer science as a field because of what I’ve learned in this class, and I am able to have more informed discussions about issues in CSWe were pleased to see that even with seemingly more exciting technical content in the course,students
Conference Session
Computing and Information Technology Division Technical Session 1
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Leila Zahedi, Florida International University; Stephanie J. Lunn, Florida International University; Samira Pouyanfar, Microsoft; Monique S. Ross, Florida International University; Matthew W. Ohland, Purdue University, West Lafayette
Tagged Divisions
Computing and Information Technology
engineering through the exploration of: 1) race, gender, and identity in the engineering workplace; 2) discipline-based education research (with a focus on computer science and computer engineering courses) in order to inform pedagogical practices that garner interest and retain women and minorities in computer-related engineering fields.Dr. Matthew W. Ohland, Purdue University at West Lafayette Matthew W. Ohland is Associate Head and Professor of Engineering Education at Purdue University. He has degrees from Swarthmore College, Rensselaer Polytechnic Institute, and the University of Florida. His research on the longitudinal study of engineering students, team assignment, peer evaluation, and active and collaborative
Conference Session
Computing and Information Technology Division Technical Session 1
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Mia Minnes, University of California, San Diego; Sheena Ghanbari Serslev, University of California, San Diego ; Madison Edwards
Tagged Divisions
Computing and Information Technology
student enthusiasm at the end of their internship to enhance the ensuing continuation of their academic experience.A. Introduction Demand for undergraduate Computer Science and Engineering (CSE) education continues to grow,driven by persistent need for professionals with technical skills. In addition to core technical knowledge,students embarking on a career in CSE must be ready to combine theory and practice in a context wherethe underlying technology continually changes, projects are large-scale and collaborative, and professionalresponsibility and ethics-based decision-making are critical when products are adopted widely. Manystudents seek hands-on industry internship experiences to complement their in-class instruction andprepare for these
Conference Session
Aerospace Design and Manufacturing (Student Papers)
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
John Vincent Kronenberger, Oregon Institute of Technology; David E. Culler, Oregon Institute of Technology; Alexander Max Ferere, Oregon Institute of Technology
Tagged Divisions
Aerospace
M.S. and Ph.D. from New Mexico State University in Industrial Engineering and over 25 years experience in using and developing Computer Aided Manufacturing (CAM) systems and teaching topics such as Product Data Management (PDM) and Product Lifecycle Management (PLM).Alexander Max Ferere, Oregon Institute of Technology c American Society for Engineering Education, 2020 An Engineering Pedagogy for Developing Practical Knowledge and Hands-On Skills Related to 5-Axis Milling and Computer Aided Aerospace Parts Manufacturing Using Current TechnologyAbstractThe implementation and effective utilization of advanced computer controlled machines andprocesses depends on a concerted effort by
Conference Session
Computing and Information Technology Division Technical Session 9
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Wendi M. Kappers, Embry-Riddle Aeronautical University, Daytona Beach; Martha Nanette Harrell, Arkansas Tech University
Tagged Divisions
Computing and Information Technology
upon real-life edu- cational and classroom issues while designing courses that explore technology utilization that is based on structured learning principles and practices. She is an experienced Computer Engineer, Teaching and Learning Center Director, and an Instructional Designer, designing in Blackboard, WebCT, eCollege, and Canvas, and holds many industry-related certifications including the Microsoft Certified Systems Engi- neer (MCSE) and Trainer (MCT) certificates.Dr. Martha Nanette Harrell, Arkansas Tech University Dr. Nan Harrell is an assistant professor in the College of Engineering and Applied Science for Arkansas Tech University. Prior to this position, she was the Information Systems Manager and Cyber
Conference Session
ET Pedagogy II
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Carmen Cioc, University of Toledo; John B. Napp, University of Toledo; Sorin Cioc, University of Toledo; Noela A. Haughton
Tagged Topics
Diversity
Tagged Divisions
Engineering Technology
the Engineering Technology Department (ET) in the College ofEngineering (COE) at the University of Toledo. The COE is one of the largest colleges in termsof enrollment and is comprised of six academic departments, including ET. The ET Departmentoffers ABET-accredited professional engineering technology programs leading to the Bachelorof Science degree in five areas of study: Computer Science and Engineering Technology(CSET), Construction Engineering Technology (CET), Electrical Engineering Technology(EET), Information Technology (IT), and Mechanical Engineering Technology (MET).The largest program in the ET Department is the MET program, which enrolls approximately400 undergraduate students. The MET student body is comprised of traditional
Conference Session
Community Engagement Division Technical Session 5
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Mary Andrade, University of Louisville; Michael Scott Keibler, University of Louisville; Josh Rivard
Tagged Topics
Diversity
Tagged Divisions
Community Engagement Division
accompanying flightrequirements as well as flow calculation methodologies.The team participated in training on high accuracy GPS units to record data and Collector forArcGIS to collect and share information. Students completed practice sessions to gain familiaritywith the tools and software. Other content areas included drone regulations, photogrammetry,ground control points and map accuracy. In addition, students spent time in the flow labreviewing three separate methodologies for calculating flow measurements. The studentsultimately chose salt computation method based on the ease of use and the availability ofresources in the region.OutcomesCommunity outcomesThe developed asset management model currently contains data for two separate
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Jeong Yang, Texas A&M University-San Antonio; Brandon Earwood, Texas A&M University-San Antonio; Young Rae Kim, Texas A&M University-San Antonio; Akhtar Lodgher, Texas A&M University - San Antonio
Tagged Divisions
Computing and Information Technology
module emphasizing encryption and decryption used as the semesterproject for the course. Each module is a collection of concepts related to cyber security. Theindividual cyber security concepts are presented with a general description of a security issue toavoid, sample code with the security issue written in the Java programming language, and asecond version of the code with an effective solution. The set of these modules was implementedin Computer Science I during the Fall 2019 semester. Incorporating each of the concepts in thesemodules into lectures depends on both the topic covered and the approach to resolving therelated security issue.Students were introduced to computing concepts related to both the security issue and theappropriate
Conference Session
Computing and Information Technology Division Technical Session 3
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Vukica M. Jovanovic, Old Dominion University; Murat Kuzlu, Old Dominion University; Otilia Popescu, Old Dominion University; Abdul Rahman Badawi, Old Dominion University; Deborah Kay Marshall, Norfolk Public Schools; Salih Sarp, Old Dominion University; Spyridoula Tsouganatou, Old Dominion University; Petros J. Katsioloudis, Old Dominion University; Linda Vahala, Old Dominion University; Hongyi Michael Wu, Old Dominion University
Tagged Divisions
Computing and Information Technology
Paper ID #31490An Initial Look into the Computer Science and Cybersecurity PathwaysProject for Career and Technical Education CurriculaDr. Vukica M. Jovanovic, Old Dominion University Dr. Vukica Jovanovic is a Batten Fellow and an Associate Professor of Engineering Technology in Me- chanical Engineering Technology Program. She holds a Ph.D. from Purdue University in Mechanical Engineering Technology, focuses on Digital Manufacturing, Magistar (Ph.D. candidate) degree in Ind- sutrial Engineering and Management, focused on Production Systems Design, and dipl.ing. degree in Industrial Engineering focused on Mechatronics
Conference Session
Computers in Education Division Technical Session 1: Topics Related to Engineering - Part 1
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Caeley Ashtyn Joy Gibbs, Queen's University
Tagged Divisions
Computers in Education
Paper ID #31559Exploration of Technology Aided Education: Virtual Reality ProcessingPlant for Chemical Engineering Process DesignMs. Caeley Ashtyn Joy Gibbs, Queen’s University Ashtyn J Gibbs received her bachelor’s degree in applied science in electrical engineering with a minor in computer science from the University of British Columbia. She is currently working towards her master’s degree at Queen’s University with a focus on using virtual reality technology for educational simulation. c American Society for Engineering Education, 2020 Exploration of Technology Aided Education: Virtual
Conference Session
Computing and Information Technology Division Technical Session 6
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Natasha Smith P.E., University of Virginia
Tagged Divisions
Computing and Information Technology
selected, columns are organized in the order of submission. Finally,the report includes a lot of extraneous columns which obfuscate the relevant information. (As acase in point, the tests passes are in column H, separated by ‘tests passed’ in column L, by thestudent name and email address!) This is likely a non-issue when the Grader is integrated withinthe LMS.Peer grading worked well, with consistent results among two peer graders; the average deviationwas 0.70/20.00 points. However, feedback was generally limited to question scores. In the future,peers could be asked to provide more specific feedback. This would require deeper scrutiny by thegrader and provide better information for the student being graded.Other feedback from course exit
Conference Session
Computing and Information Technology Division Technical Session 7
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Radana Dvorak, University of Portland; Heather Dillon, University of Portland; Nicole Ralston, University of Portland; Jeffrey Matthew Welch, University of Portland
Tagged Divisions
Computing and Information Technology
program, and an instructor in computer science, teaching various CS courses. Her current research interests are related to teaching in STEM fields. She advises the cybersecurity club, and is a member of several organizations including OWASP-Portland Chapter. Dr. Dvorak is passionate about teaching, technology, career pathways and student success.Dr. Heather Dillon, University of Portland Dr. Heather Dillon is an Associate Professor in Mechanical Engineering at the University of Portland. She recently served as the Fulbright Canada Research Chair in STEM Education. Her research team is working on energy efficiency, renewable energy, fundamental heat transfer, and engineering education. Before joining the university
Conference Session
Computing and Information Technology Division Technical Session 6
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Ciprian Popoviciu, East Carolina University; Philip J. Lunsford II, East Carolina University; John Pickard, East Carolina University; Colby Lee Sawyer, East Carolina University; Jarvis Woodburn; Zachary Ryan Zynda, East Carolina University; Dale Drummond, East Carolina University
Tagged Divisions
Computing and Information Technology
managementcan become a challenge when issues occur. On one hand, current IT organizations are not well equippedto manage service overlays such as SaaS based solutions. On the other hand, SaaS based deliveryrelies on the good functioning of multiple management domains without cross domain visibility.In this paper we detail the work of designing and implementing a management platform for a conferencingservice launched by East Carolina University and distributed over multiple admin domains. The projectoffered a collaboration opportunity between students, graduate and undergraduate, from two distinctdepartments: Information and Computer Technology [1], and Computer Science [2]. The task assigned tothe team was to deploy a monitoring solution enabling
Conference Session
Professional Issues and Opportunities for Engineering Librarians
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Debbie Morrow, Grand Valley State University
Tagged Divisions
Engineering Libraries
Paper ID #28644Assessing an Assessment: A Case Study of the NSSE ’Experiences withInformation Literacy’ ModuleMs. Debbie Morrow, Grand Valley State University Debbie Morrow currently serves as Liaison Librarian to the School of Engineering and the other units within the Padnos College of Engineering & Computing at Grand Valley State University, to the Math- ematics, Statistics, and Physics departments, and to the Honors College at GVSU. In that position her primary role is to support students in courses in her liaison areas both in and outside of their classrooms. Helping students make connections between information
Conference Session
Computing and Information Technology Division Technical Session 5
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Bin Cong, California State University at Fullerton; Christopher Ryu, California State University at Fullerton; Raman Menon Unnikrishnan, California State University at Fullerton
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
improvement transcended the strictcurricular boundaries. Many of the changes made were in the process of assessment andevaluation. The process initiated in 2016 and 2017 was improved in 2018 and 2019. The“One-Stop ABET website,” and our refined data collection and analysis tools helped thefront end of the assessment process. The efficiencies of these improvements provided moretime to the faculty to deliberate issues related to evaluation and implementation.The new assessment system defines key performance indicators (Table 2) that are related to theessential core of the computer science discipline. These indicators are used to demonstratecompliance with the SOs. A Traceability Matrix (Table 3) is used to show the relationship amongcourses
Conference Session
Computing and Information Technology Division Technical Session 8
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Simeon Ntafos, University of Texas at Dallas
Tagged Divisions
Computing and Information Technology
Change of Major Policy and its EffectsAbstract: Considerable attention has been paid to factors affecting student's selection ofEngineering and related majors [1, 3, 5] and issues affecting retention and graduation in thesemajors [4, 7]. Lesser attention has been paid to change of major policies and their effects [2].We study the history and effects of "change of major" policies in the Erik Jonsson School ofEngineering and Computer Science at the University of Texas at Dallas. We further focus ontwo closely related degree programs (Computer Science and Computer Engineering) that aredelivered by different departments within the School. A university-wide policy that justrequired "good standing" to change major up to four years ago has evolved into
Conference Session
Computing and Information Technology Division Technical Session 2
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Alyssa Mendlein, Temple University; Thuy-Trinh Nguyen, Temple University ; Aunshul Rege, Temple University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
of information on a variety of topics, which lawenforcement agencies can access after individual verification of employment [5]. Those agenciescan then use open source data for a variety of functions: identifying and verifying facts, socialnetworking, identifying criminal offenders, understanding and interpreting ideologies,identifying criminal methodologies, and identifying emerging crime issues and trends [5].Therefore, the government and law enforcement agencies can use information gathered frompublic sources defensively to protect from physical or cyberattacks and capture criminals, inaddition to offensively.For-profit companies have also adopted OSINT methods to create defensive strategies againstcyberattacks. The advances in technology
Conference Session
Computing and Information Technology Division Technical Session 5
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Hassan Rajaei, Bowling Green State University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Paper ID #30994A Healthcare Case-Study to Teach Simulation TechniquesDr. Hassan Rajaei, Bowling Green State University Hassan Rajaei is a professor of computer science at Bowling Green State University, Ohio. His research interests include cloud computing, High Performance Computing (HPC), distributed simulation, parallel and distributed processing, communication networks, wireless communications, and IoT. Rajaei received his Ph.D. from Royal Institute of Technology, KTH, Stockholm, Sweden, and he holds a M.S.E.E. from the University of Utah, and a BS from University of Tehran. c American Society
Conference Session
Computing and Information Technology Division Technical Session 2
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Sin Ming Loo, Boise State University; Liljana Babinkostova
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Systems Security Introductory Course for STEM Students AbstractWe are witnessing the rapid development and adoption of Cyber-Physical Systems (CPS). CPSrefers to the integration of digital and internetworked components, and physical devices in systemsthat affect nearly everyone in society. These devices are always connected to the internet. Thisconnectivity gives CPS devices the capability of being in continuous monitoring mode where dataand information are delivered to device owners through a proxy server. These capabilities open upall kinds of security issues for a device that has been built with such features with little regard forsecurity considerations. At present, many Science, Technology
Conference Session
Computing and Information Technology Division Technical Session 5
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Shinelle Hutchinson, Purdue University, West Lafayette; Yung Han Yoon, Purdue University, West Lafayette; Neesha Shantaram; Umit Karabiyik, Purdue University, West Lafayette
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
, Purdue University Dr. Umit Karabiyik is an Assistant Professor in the Department of Computer and Information Technology at Purdue University. Prior to his appointment at Purdue, Dr. Karabiyik was an Assistant Professor in the Department of Computer Science at Sam Houston State University from 2015 to 2018. Dr. K received his M.S. and Ph.D. degrees from Florida State University in 2010 and 2015 respectively. His research interests broadly lie in Digital and Cyber Forensics, User and Data Privacy, Artificial Intelligence, Computer and Network Security. He is a recipient of federal grants from National Institute of Justice. He is an Associate Editor-in-Chief for Journal of Digital Forensics, Security and Law, and
Conference Session
Computing and Information Technology Division Technical Session 8
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Jorge Crichigno, University of South Carolina; Elias Bou-Harb, University of Texas at San Antonio; Elie Kfoury, University of South Carolina; Jose Gomez, University of South Carolina; Antonio Mangino, University of Texas at San Antonio
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Paper ID #30440Training and Teaching Students and IT Professionals on High-throughputNetworking and Cybersecurity using a Private CloudDr. Jorge Crichigno, University of South Carolina Jorge Crichigno is an Associate Professor in the Department of Integrated Information Technology (IIT), College of Engineering and Computing (CEC), at the University of South Carolina (USC). Dr. Crichigno’s research focuses on practical implementation of high-speed networks and network security, custom pro- tocol development using P4 switches, experimental evaluation of congestion control algorithms, and scal- able flow-based intrusion
Conference Session
Computing and Information Technology Division Technical Session 7
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Stephen Michael MacNeil, University of California, San Diego; Mohsen M. Dorodchi, University of North Carolina at Charlotte; Erfan Al-Hossami, University of North Carolina at Charlotte; Aileen Benedict, University of North Carolina at Charlotte; Devansh Desai, University of North Carolina at Charlotte; Mohammad Javad Mahzoon, Core Compete Inc.
Tagged Divisions
Computing and Information Technology
rheumatology, 34(3):458–459, 2007.[22] Ben Shneiderman. The eyes have it: A task by data type taxonomy for information visualizations. In Proceedings of the 1996 IEEE Symposium on Visual Languages, VL ’96, pages 336–, Washington, DC, USA, 1996. IEEE Computer Society. ISBN 0-8186-7508-X. URL http://dl.acm.org/citation.cfm?id=832277.834354.[23] Punya Mishra and Matthew J Koehler. Technological pedagogical content knowledge (tpck): Confronting the wicked problems of teaching with technology. In Society for Information Technology & Teacher Education International Conference, pages 2214–2226. Association for the Advancement of Computing in Education (AACE), 2007.[24] Katrin Becker. Wicked id: Conceptual framework for considering
Conference Session
Computing and Information Technology Division Technical Session 2
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Tamer Omar, California State Polytechnic University, Pomona; Abdelfattah Amamra, California State Polytechnic University, Pomona; Kristina Rigden, California State Polytechnic University, Pomona; Thomas Ketseoglou, California State Polytechnic University, Pomona
Tagged Divisions
Computing and Information Technology
Operational Technologies (OT) domains add to thesurface of attacks to the existing vulnerable Information Technology (IT) systems domain. Theseattacks include a number of diverse threats such as Distributed Denial-of-Service, ransomware,Advanced Persistent Threats and others. All these threats affect the operations of the IT/OT/IoTsystems and cost globally $148 million in 2018 [1, 2].Cybersecurity is interdisciplinary by nature. The survey in [3] shows that cybersecurity science isnot only related to computer and engineering science, but to many different sciences such asinformation science, business and management, psychology, criminal justice, and forensic science.We recommend in this work that a cybersecurity program should be interdisciplinary to
Conference Session
Computing and Information Technology Division Technical Session 9
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Mohammad Rafiq Muqri, DeVry University, Pomona
Tagged Divisions
Computing and Information Technology
Paper ID #29236CARLO SIMULATIONSDr. Mohammad Rafiq Muqri, DeVry University, Pomona Dr. Mohammad R. Muqri is a Professor in College of Engineering and Information Sciences at DeVry University. He received his M.S.E.E. degree from University of Tennessee, Knoxville. His research interests include modeling and simulations, algorithmic computing, analog and digital signal processing. c American Society for Engineering Education, 2020ObjectiveThis teaching module was designed to enhance the knowledge and expertise of ourstudents which enabled them to successfully apply Mont Carlo Methods to solve differential
Conference Session
Computing and Information Technology Division Technical Session 4
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Awatif Amin, Johnson C. Smith University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Paper ID #29525Predicting Retention Rates from students’ Behavior.Dr. Awatif Amin, Johnson C. Smith University Awatif Amin is a computer science Assistant professor at Johnson C. Smith University scince 2001. She primarily focuses on programming and data analytics. She completed her Doctorate of Management in organizational Leadership with specialization in Information System Technology (DM/IST), She earned her B.S. and M.S. in Computer Science. c American Society for Engineering Education, 2020 Predicting Retention Rates from students’ Behavior.AbstractMachine learning and Data mining
Conference Session
Computing and Information Technology Division Technical Session 1
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
James K. Nelson Jr. P.E., Texas A&M University; Brent L. Donham, Texas A&M University-Commerce
Tagged Divisions
Computing and Information Technology
sector.IntroductionCybersecurity is an emerging field with significant implications as the use of interconnecteddevices increases. The need for trained cybersecurity professionals is increasing, yet theworkforce is not increasing to match the need. Jeff Kaitlin in 2017 reported that: The ISACA, a non-profit information security advocacy group, predicts there will be a global shortage of two million cyber security professionals by 2019. Every year in the U.S., 40,000 jobs for information security analysts go unfilled, and employers are struggling to fill 200,000 other cyber-security related roles, according to cyber security data tool CyberSeek. And for every ten cyber security job ads that appear on careers site Indeed
Conference Session
Computing and Information Technology Division Technical Session 1
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Franz J. Kurfess, California Polytechnic State University, San Luis Obispo; Maria Pantoja, California Polytechnic State University, San Luis Obispo; Irene Humer, California Polytechnic State University, San Luis Obispo
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Polytechnic State University San Luis Obispo Ph. D. Electrical Engineering and Information Technology, Vienna University of Technology M. S. Physics, University of Vienna M. S. Education Physics and Mathematics, University of Vienna Research Interests: Computer Science Education, Physics Simulation, Applied Computing c American Society for Engineering Education, 2020 Deep Learning and Artificial Intelligence: Project Collaboration across ClassesAbstract. Working in collaborative environments is an essential skill for computingprofessionals. In our program, students have significant team experience from previous classes;almost all of our classes in Cal Poly’s