Asee peer logo
Well-matched quotation marks can be used to demarcate phrases, and the + and - operators can be used to require or exclude words respectively
Displaying results 1 - 30 of 41 in total
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2017 ASEE Annual Conference & Exposition
Authors
Lorri J Barnett, Purdue Polytechnic, Anderson; Dennis O. Owen, Purdue University
Tagged Divisions
Computing & Information Technology
Engineering Education, 2017 Dual Credit Programs: K-12 Outreach, Recruiting, or BothAbstractRecruiting consumes considerable resources for any post-secondary institution. Manyinstitutions also have a mission of K-12 engagement. A dual credit program helps an institutionfulfill its K-12 outreach mission and also provide valuable recruiting opportunities. This paperexplores the process of creating and implementing a dual credit program at Purdue PolytechnicAnderson, a regional location Purdue University’s statewide program.Traditional dual credit programs are concurrent enrollment models, whereby high school coursesare taught by high school faculty and for which high school juniors and seniors can also earncollege credit. Other dual credit
Conference Session
Potpourri
Collection
2015 ASEE Annual Conference & Exposition
Authors
Joseph Alan Nygate, Rochester Institute of Technology (CAST); Richard Cliver, Rochester Institute of Technology (CAST)
Tagged Divisions
Computing & Information Technology
level. Richard also works for the Eastman Kodak Company as a Senior Design Engineer. Richard has received two teaching awards while at RIT. He was the recipient of the 1998 Adjunct Excellence in Teaching Award and the recipient of the 2002 Provost’s Excellence in Teaching Award. Richard is a contributing volunteer in both ABET and IEEE. Page 26.929.1 c American Society for Engineering Education, 2015Improving Technical Writing Skills through the Judicious Use of InfographicsMotivationThis paper shares the experiences and outcomes of teaching data visualization techniques withingraduate
Conference Session
Emerging Information Technologies
Collection
2011 ASEE Annual Conference & Exposition
Authors
Abul K. M. Azad, Northern Illinois University
Tagged Divisions
Computing & Information Technology
limited time period. Considering themixed ability level of students, the allocated time is often not enough for all students tocomplete their tasks satisfactorily and also gain sufficient experience through the process 6,7.Sometimes students want or feel a need to perform additional experiments beyond theirassigned tasks. It is usually difficult to accommodate any extra time due to the lack ofavailable resources to keep the laboratories open. Additionally, laboratory facilities are often Page 22.1002.2inaccessible to the students of other departments within the same institution because of theirgeographical location. Ironically, too much laboratory
Conference Session
Information and Network Security
Collection
2013 ASEE Annual Conference & Exposition
Authors
Abul K. M. Azad, Northern Illinois University; Munish Sharma, Northern Illinois University
Tagged Divisions
Computing & Information Technology
sufficient experience through the process.4,5 Sometimesstudents want or feel a need to perform additional experiments beyond their assigned tasks. It isusually difficult to accommodate any extra laboratory time due to the lack of available resourcesto keep the laboratories open. Additionally, laboratory facilities are often inaccessible to thestudents of other departments, even within the same institution, because of their geographicallocation. Ironically, too much laboratory equipment lies idle during most of its usable lifetime.6,7,8Only a remote experimentation facility can provide cost effective and unlimited access toexperiments and maximize the utilization of available resources. Moreover, this will allow inter-laboratory collaboration among
Conference Session
Topics in Computing and Information Technologies
Collection
2014 ASEE Annual Conference & Exposition
Authors
Abul K. M. Azad, Northern Illinois University; Namratha Siripragada, Northern Illinois University
Tagged Divisions
Computing & Information Technology
-Zubía, J., Angulo, I., Rodriguez-Gil, L., Orduña, P., Dziabenko, O., and Güenaga, M. (2013). Boole- WebLab-FPGA: Creating an Integrated Digital Electronics Learning Workflow Through a Hybrid Laboratory and an Educational Electronics Design Tool, International Journal of Online Engineering, 9, pp. 19-22. Page 24.563.15[5] Yan, X., Wang, F., Hu, L., Zhao, K., and Xiong, W. (2013). Application-oriented Network Performance Evaluation for the Internet of Things, International Journal of Online Engineering, 9(7), pp. 51-56.[6] Das,B., Chattopadhyay,A., Fatima, S., Mohanty, A. R. (2013). Remote Triggered Virtual
Conference Session
Information and Network Security
Collection
2013 ASEE Annual Conference & Exposition
Authors
Krystal S Corbett, Cyber Innovation Center; Chuck Gardner, New Orleans Military and Maritime Academy; Anthony Joseph Taffaro Jr., New Orleans Military and Maritime Academy; Marvin Nelson, Benton High School
Tagged Divisions
Computing & Information Technology
collaboration with the CyberInnovation Center (CIC), a 501c3 not-for-profit corporation. Physics and Cyber Science wereoriginally piloted regionally in 2010 and 2011, respectively, and then, expanded to a largerregion including schools in the states Louisiana, Texas, and Arkansas in 2011 and 2012,respectively.Established through the CIC is the National Integrated Cyber Research Center (NICERC).NICERC’s Cyber Science and Physics courses utilize many technologies and projects to drive tothe fundamental content. Cyber Science, specifically, integrates various disciplines (engineering,computer science, and liberal arts) to convey the ideas of cyber. NICERC’s Physics utilizes amicrocontroller platform to convey physics concepts. With such unique curricula
Conference Session
Communication Across the Divisions III: Writing as Social–Technical Integration
Collection
2015 ASEE Annual Conference & Exposition
Authors
Tatiana Teslenko, University of British Columbia, Vancouver
Tagged Divisions
Computing & Information Technology, Liberal Education/Engineering & Society
through the perspectives of variousstakeholders. Starting with local projects, subsequent assignments involve projects based in theglobal context. In this way, students move from community service projects to the exploration ofglobal implications of engineering practice. This process helps them to develop an understandingof global citizenship.The Institutional ContextThe University of British Columbia (UBC) is the leading university of the Province of BritishColumbia, and it has been consistently ranked among the top 5 universities in Canada and top 40universities in the world. This four-year university serves about 60 thousand students in a broadrange of programs, from undergraduate liberal arts and sciences to professional programs,including
Conference Session
Emerging Computing and Information Technologies I
Collection
2015 ASEE Annual Conference & Exposition
Authors
Smitesh Bakrania, Rowan University; Brad Joseph Johnson, Rowan University
Tagged Divisions
Computing & Information Technology
. Replacing the previously laborious exercise ofassignment was a primary motivator for this effort. The algorithm utilized Google Apps Script’sability to generate and manipulate data objects while having full access to Google’s variety ofcloud services. Furthermore, to create a robust platform for improved student assignment, newproject and student requirements that could not previously be accommodated were added. For theFall 2014 term, the new automated approach was compared to the old manual sorting method byeach of the four engineering departments. Beyond the obvious benefits, further advantages of theautomated assignment are documented here. This paper describes the automation approach indetail and provides insights for implementing such a
Conference Session
Emerging Information Technologies
Collection
2011 ASEE Annual Conference & Exposition
Authors
Richard G. Helps, Brigham Young University
Tagged Divisions
Computing & Information Technology
circuits," Electronics, vol. 38, April 19, 1965 1965.12 R. R. Schaller, "Moore's Law: Past, Present and Future," IEEE Spectrum, vol. 34, pp. 52-59, June 1997 1997.13 L. G. Roberts, "Beyond Moore's law: Internet growth trends," Computer, vol. 33, pp. 117-119, 2000.14 D. K. Lidtke, "What's new in curriculum design: working with industry," in 28th Annual Frontiers in Education Conference, 1998, p. F4E.15 R. Lister and I. Box, "A citation analysis of the SIGCSE 2007 proceedings," presented at the Proceedings of the 39th SIGCSE technical symposium on Computer science education, Portland, OR, USA, 2008.16 "Proceedings of the 9th ACM SIGITE conference on Information technology education," Cincinnati
Conference Session
IT-based Instructional Technologies
Collection
2012 ASEE Annual Conference & Exposition
Authors
Alexander A. Kist, University of Southern Queensland
Tagged Divisions
Computing & Information Technology
. Moebs’14 focussed on the effect of ‘flow’ on QoEfor learners, in an attempt to address this. Although flow is expected to be highly relevant to theeffect of system performance (QoS) on QoE, the study does not account for the relative effect ofall the factors that are expected to impact on QoE for learning. For the purpose of this paper, it isenough to assume that a QoS threshold exists beyond which technical performance becomes thedominant (negative) factor in the learning experience. This observation is also supported bytechnical studies into Quality of Experience15, 16 that suggest that there is a logarithmicrelationship between technical performance parameters and quality of experience.Network access quality is a necessary but not a
Conference Session
Communication Across the Divisions III: Writing as Social–Technical Integration
Collection
2015 ASEE Annual Conference & Exposition
Authors
Natascha M. Trellinger, Purdue University, West Lafayette; Rebecca R. Essig, Purdue University, West Lafayette; Cary D. Troy, Purdue University, West Lafayette; Brent K. Jesiek, Purdue University, West Lafayette; Josh Boyd, Purdue University, West Lafayette
Tagged Divisions
Computing & Information Technology, Liberal Education/Engineering & Society
control volume steady?” Thisproblem, which we designated as conceptual-definition (3.a.), was explained in detail in thesolutions manual, breaking it up into analysis and discussion pieces. This information andexplanation in the solutions manual would provide considerable information for an instructor tomake a judgment on a student’s understanding and assign a grade. Analysis: Flow through a control volume is steady when it involves no change with time at any specified position. Description: This applies to any variable we might consider – pressure, velocity, density, temperature, etc.However, problems in the “Design and Essay” designation were not explained in the solutionsmanual beyond stating: “Students’ essays and
Conference Session
Emerging Information Technologies
Collection
2011 ASEE Annual Conference & Exposition
Authors
Barbara E. Brazon, Penn State University; Mary Lynn Brannon, Pennsylvania State University, University Park
Tagged Divisions
Computing & Information Technology
traditional method used in the classroom consisted of lectures based on the text book writtenby K. Schwalbe, reading assignments, reports, and exams. The lectures included standardillustration, case studies and short video clips. The video clips were found on YouTube.com bythe students and demonstrated key concepts found in the reading material. Students were thenrequired to work with their real class client to define project scope, create workable timeline, andbudget, and manage team members and work flow, while navigating through the key phase of aproject lifecycle. The students were required to develop a project charter that addressed scope,quality, schedule, cost, configuration, change, communication, human resource, procurement andrisk
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2015 ASEE Annual Conference & Exposition
Authors
Mohamed Abdelrahman, Texas A&M University-Kingsville; Mohamed Abdelsalam Salem, Text Scope; Mais Nijim, Texas A&M Kingsville
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
;  }                                                                                            Figure 9: Filter Function to Illustrate switch StatementConclusions and Future WorkThe iHASOB idea proposes the integration of electronic text, software, and hardware into asingle environment to facilitate different modes of learning that are supported the literature. Inthe prototyped embodiment, a student will read an e-book, run a domain specific software relatedto the e-book, and collect and display data related to the topic being studied. The data collectionis performed through hardware interface to an iPad. The hardware facilitates collecting data fromsensors connected to a microcontroller board. The iHASOB could be used in facilitating thestudy of many subjects in science and engineering and can be expanded far beyond the currently
Conference Session
Embedded Systems and Mobile Computing
Collection
2013 ASEE Annual Conference & Exposition
Authors
Francis N Mensah, College of Engineering and Technology, Brigham Young University; Richard G. Helps, Brigham Young University
Tagged Divisions
Computing & Information Technology
,” in Beyond Fear, 2006, pp. 14 – 16. Page 23.1057.176. M. E. Whitman and H. J. Mattord, "Introduction to Information Security," in Principles of Information Security, pp 8, 20117. K. Stouffer and K. Scarfone, “Guide to Industrial Control Systems ( ICS ) Security Recommendations of the National Institute of Standards and Technology,” 2011.8. A. C. Alvaro, “Challenges for Securing Cyber Physical Systems.” in Workshop on future directions in cyber-physical systems security, 2009.9. K. K. Venkatasubramanian, "Security in Pervasive Computing,” Ph.D. dissertation, Arizona State University, Arizona
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2014 ASEE Annual Conference & Exposition
Authors
David M. Whittinghill, Purdue University, West Lafayette; Jacob Samuel Brown, Purdue University
Tagged Divisions
Computing & Information Technology
thateducational based games are generally as effective as traditional educational approaches but also Page 24.638.3benefit from increased learner satisfaction with and motivation toward their lessons 27, 28. Thesefindings are particularly relevant in the current study as maintaining the interest of the player iscrucial as increased player engagement and participation is what drives the effectiveness of theintervention.Health gamesHealth games have a long history that dates back at least to the 1980’s 17. However, only untilrecently have gains in technology and manufacturing cost made it practical to consider game-based physical therapy beyond specialized
Conference Session
New Trends in Computing and Information Technology Education
Collection
2014 ASEE Annual Conference & Exposition
Authors
Kien A. Hua, University of Central Florida; Gholam Ali Shaykhian, NASA; Robert J Beil, NASA Engineering and Safety Center; KUTALMIS AKPINAR, School of Electrical Engineering and Computer Science, University of Central Florida; Kyle A. Martin, University of Central Florida
Tagged Divisions
Computing & Information Technology
scaled up and higher resolution imagery is processedthere will likely be many millions of indexed ROIs. Searching through such a large data set willnot be very efficient. To address this issue we have begun investigating clustering techniques,such as k-means clustering [21], [22] and Locality Sensitive Hashing [23] to identify clusters ofneighboring ROIs within the multidimensional feature space and assign representative ROIs foreach cluster. Searching through this much smaller set of representative ROIs will be much moreefficient. These clusters will also form the basis for the image mining and annotation featuresdescribed earlier.7 Future WorkThe results accomplished in this six-month exploratory research have demonstrated the validityof
Conference Session
Curricular Issues in Computing and Information Technolog Programs
Collection
2013 ASEE Annual Conference & Exposition
Authors
James P Cohoon, University of Virginia; J. McGrath Cohoon, University of Virginia; Luther A Tychonievich, University of Virginia; Catherine E. Brawner, Research Triangle Educational Consultants
Tagged Divisions
Computing & Information Technology
important time for developing education and career goals. The majority ofstudents majoring in science, technology, engineering, or math made that decision during highschool.17Many high schools contribute to the low numbers and gender imbalance through non-existent CScourses or by mislabeled non-CS offerings, such as keyboarding, with the CS label. High schoolsalso often lack teachers trained in the CS subject area, are unaware of the gender issues incomputing, and engage in minimal efforts to recruit students into CS. Numerous calls forimprovement point to a need for: ● Access to high quality computing experiences, ● Public understanding of what computing really is, ● Course content, ● Teacher training, ● Education policies
Conference Session
Innovations in Computing Education
Collection
2011 ASEE Annual Conference & Exposition
Authors
Alejandra J. Magana, Purdue University, West Lafayette; Aidsa I. Santiago-Román, University of Puerto Rico, Mayaguez; Nayda G. Santiago, University of Puerto Rico, Mayaguez; Cesar A Aceros; Brandeis H Marshall, Purdue University; Eric T. Matson, Purdue University, West Lafayette
Tagged Divisions
Computing & Information Technology
Page 22.1347.137. Hmelo-Silver, C. (2004). Problem-based learning: what and how do students learn? Educational Psychology Review, 16(3), 235-266.8. Wing, J. M. (2006). Computational thinking. Communications of the ACM, 49(2), 33-35.9. Denzin, N. K., & Lincoln, Y. S. (2000). The discipline and practice of qualitative research. Handbook of qualitative research, 2, 1-28.10. Patton, M. Q. (2002). Qualitative research & Evaluation Methods. Thousand Oaks, Ca.: Sage Publications.11. Charmaz, K. (2006). Constructing Grounded Theory: A Practical Guide Through Qualitative Analysis: Sage.12. Glaser, B., & Strauss, A. (1967). The discovery of grounded theory: Strategies for qualitative research. Chicago, IL Aldine.13. Dale, N
Conference Session
Computing & Information Technology Division Technical Session
Collection
2016 ASEE Annual Conference & Exposition
Authors
Joshua Levi Weese, Kansas State University; Russell Feldhausen, Kansas State University; Nathan H. Bean
Tagged Divisions
Computing & Information Technology
Design intervention offered more room for students to create and implement theirown ideas in their final project video game.Conclusions and Future WorkIn this paper, we discussed two novel interventions applied during a 5th-9th grade summerSTEM institute. Though both interventions differed in topics (video games vs. Mars rover),they showed similarly strong improvements in student self-efficacy in CT concepts. Thispedagogy shows that it has a positive impact how CT concepts are delivered through CS andcomputer programming at the K-12 level. Likewise, by expanding the survey done by Bell,we were able to gain more insight into specific CT concepts learned by students in a similarenvironment5. Furthermore, we were able to reveal some lasting impacts
Conference Session
Emerging Computing and Information Technologies I
Collection
2016 ASEE Annual Conference & Exposition
Authors
Douglas M. Schutz, Tokyo University of Science; Dante Dionne, Korean Air; Yong-Young Kim P.E., Konkuk University
Tagged Divisions
Computing & Information Technology
sharedexperiences; 2) externalization (E) is converting tacit knowledge into explicit knowledgethrough codification; 3) combination (C) is creating explicit knowledge from other explicitknowledge by sorting, adding, and categorizing from exchanges with others; 4)internalization (I) is the converting of explicit knowledge into tacit knowledge for individuallearning.Knowledge can be viewed as an object in the sense that it can be gathered, stored, andtransferred like an “object” [7]. Knowledge can also be viewed as a process in that it can bedeveloped, shared, and distributed. Through the lens of practice, the understanding ofknowledge extends beyond development or delivery, and can include the consumption andshared participation by employees and groups
Conference Session
Curricular Issues in Computing
Collection
2017 ASEE Annual Conference & Exposition
Authors
Sreyoshi Bhaduri, Virginia Tech; Tamoghna Roy, Virginia Tech
Tagged Divisions
Computing & Information Technology
an earlier section on threats to validity, another area of future workis in terms of developing engineering education specific datasets which are more relevant tocontexts of engineering, and more relevant to the engineering community of practice.ReferencesBarnett, R. (2003). Beyond All Reason: Living with Ideology in the University: ERIC.Bird, S., Klein, E., & Loper, E. (2009). Natural language processing with Python: analyzing text with the natural language toolkit: " O'Reilly Media, Inc.".Church, K. W., & Mercer, R. L. (1993). Introduction to the special issue on computational linguistics using large corpora. Computational Linguistics, 19(1), 1-24.Creamer, E. G., & Ghoston, M. (2013). Using a mixed methods
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2017 ASEE Annual Conference & Exposition
Authors
Chaomin Luo, University of Detroit Mercy; Jiawen Wang, University of Detroit Mercy; Wenbing Zhao, Cleveland State University; Lei Wang, Anhui Polytechnic University
Tagged Divisions
Computing & Information Technology
theories of ROS and the students may not have hands-on opportunities to learn the ROSadvanced software development [15]. Lab-driven learning has been considered to be the mosteffective pedagogy for teaching and learning in electrical engineering [17]. However, if the labactivities are not authentic, too large to handle, or not well-aligned to what we expect ourstudents to learn about ROS, students will still not be able to master ROS meaningfully. Themeaningful mastery of a technology is beyond learning about the technology’s functionsrepresented in the tool bars or menus, or even beyond doing a few random exercises through trialand error. To make meaningful mastery happen, we call for the adaptation of TPACK, atheoretical framework regarding
Conference Session
Topics in Computing and Information Technologies
Collection
2014 ASEE Annual Conference & Exposition
Authors
Manghui Tu, Purdue University Calumet; Kimberly Lynn Spoa-Harty, Purdue University Calumet Graduate Student
Tagged Divisions
Computing & Information Technology
enterprise environment. An insider may first createsecret user account and setup a virtual machine (VM) instance, and then copy sensitive data di tothe VM instance to be accessed later. Let P = {p1, p2, …, pK} denote the set of K access paths inthe healthcare enterprise environment, where pi is one specific access path such as USB access,CD access, VM instance access, email access, etc. Let Path({ui}, k) denote the set of accesspaths to data dk by a subset of users, {ui}, in U, then Path({ui}, k) can be defined by a set of 4-tuples (ui, oj, dk, pm,). With the 4-tuples (U, O, D, P) data access path modeling, denoted asUODP, it is possible to identify whether an access activity is an inside activity or not. Anapplication developer ui copy healthcare
Conference Session
Emerging Computing and Information Technologies I
Collection
2015 ASEE Annual Conference & Exposition
Authors
Steven Walter Tuttle, University of Technology Sydney; Bruce Moulton, University of Technology Sydney; David Lowe, The University of Sydney
Tagged Divisions
Computing & Information Technology
line items. The 25 columns were merged intoone single column with 1,265 line items. The 1,265 individual remote laboratorycharacteristics were then sorted alphabetically.Exact duplicates were easily identified within the alphabetized list. Exact duplicates wereremoved. Several passes through the list were made to ensure all duplicates were caught.A more challenging task was to identify fungible concepts and reduce the related fungibles toa single line item. Again in several passes were made through the list so that all thefungibles were caught and condensed.The initial merged list of 1,265 terms was first reduced by duplicate elimination and thenreduced again by converting multiple homologous entities to a single line item. In the endthe 25
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2014 ASEE Annual Conference & Exposition
Authors
MD B. Sarder, University of Southern Mississippi
Tagged Divisions
Computing & Information Technology
://www.park.edu/cetl/quicktips/writinglearningobj.html 14. Radwan Ali and Elke Leeds, (2009), “The Impact of Face-to-Face Orientation on Online Retention: A Pilot Study”, Online Journal of Distance Learning Administration, Volume XII, Number IV, Winter 15. Huett, J. K., Kalinowski, K. E., Moller, L. & Huett, K. C. (2008). Improving the motivation and retention of online students through the use of ARCS-Based E-Mails. The American Journal of Distance Education, 22 (3), 159 Page 24.760.16
Conference Session
Topics in Computing and Information Technologies I
Collection
2015 ASEE Annual Conference & Exposition
Authors
Wei Zheng, Jackson State University; Jianjun Yin, Jackson State University; Yanhua Cao, Jackson State University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
challenging opinions with peers1, 2. Through collaborativelearning, students may learn far beyond the limit of what they can reach from their independentindividual learning. The driving force behind collaborative learning is the social interactions inlearning, which may provoke both cognitive and meta-cognitive processes in learning3, 4, 5.Therefore, collaborative learning is being acknowledged and utilized by more and moreengineering faculty and students for facilitating learning. Koehn et al. had found thatcivil/construction-engineering students preferred collaborative learning6. A pilot surveyconducted by the authors of this paper also revealed that STEM students at authors’ institutionalso recognized the effectiveness of collaborative learning
Conference Session
Emerging Computing and Information Technologies
Collection
2013 ASEE Annual Conference & Exposition
Authors
Shaundra Bryant Daily, Clemson University; Juan E Gilbert, Clemson University; Wanda Eugene, University of North Carolina Charlotte; Christina Gardner-McCune, Clemson University; Kyla Alanna McMullen, Clemson University; Phillip Wendell Hall Jr, Clemson University ; Sekou L Remy, Division of Human Centered Computing - School of Computing, Clemson University; Damon Lamar Woodard, Clemson University; Tania Roy, Clemson University
Tagged Divisions
Computing & Information Technology
Computing, Human-Centered Computing Division at Clemson University. Her research focuses on gaining a better understand of how students learn and apply STEM and computing content in their everyday lives. She is particularly inter- ested in the iterative design, refinement, and sustainability of curriculum and program development to support computing and STEM learning in formal and informal learning environments. She has designed and piloted a mobile application course for undergraduate non-CS majors through her participation last summer in the national pilot of the new AP CS Principles course. She is currently designing mobile application curriculum with MIT AP Inventor for 8th grade mathematics classes and middle
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2011 ASEE Annual Conference & Exposition
Authors
Joseph Idziorek, Iowa State University; Mark F. Tannian, Iowa State University; Douglas W. Jacobson, Iowa State University
Tagged Divisions
Computing & Information Technology
will be immediately applicable and serve students long after they leave theuniversity. Beyond serving the students, we believe that society’s collective security depends onevery user being security-aware and exhibiting thoughtful discipline over their personalinformation and computing resources. It has long been recognized by security experts that theuser is in fact the weakest link in the security chain and that technical measures alone cannot andwill not solve current cyber security threats1. So why not target the weakest link and address itin a formal educational environment? Page 22.1379.2
Conference Session
Curricular Issues in Computing
Collection
2017 ASEE Annual Conference & Exposition
Authors
Tony Andrew Lowe, Purdue University, West Lafayette (College of Engineering); Sean P. Brophy, Purdue University, West Lafayette (College of Engineering)
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
, computer scientist and learning scientists. His research in engineering education and learning sciences explores how undergraduate engineering students develop skills in design, troubleshooting and analytical reasoning. He is particularly interested in how these skills develop through students’ interaction with technology. c American Society for Engineering Education, 2017 Understandingtheimpactofstrategicteamformationinearly programmingeducationAbstractThis evidence based research looks at the impact of a team-based instruction on learning toprogram in a first year engineering course designed under the Bauhaus studio model. Each teamis formulated with a “more knowledgeable
Conference Session
Information and Network Security
Collection
2015 ASEE Annual Conference & Exposition
Authors
Kristine Donate, Florida Atlantic University; Ravi T. Shankar, Florida Atlantic University; Diana Mitsova, Florida Atlantic University; Francis Xavier McAfee, Florida Atlantic University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
. Shankar, Florida Atlantic University Ravi Shankar has a PhD in Electrical and Computer Engineering from the University of Wisconsin, Madi- son, WI, and an MBA from Florida Atlantic University, Boca Raton, FL. He is currently a senior professor with the Computer and Electrical Engineering and Computer Science department at Florida Atlantic Uni- versity. His current research interests are on K-12 education, engineering learning theories, and education data mining. He has been well funded by the high tech industry over the years. He has 7 US patents, of which 3 have been commercialized by the university. He has published earlier work on the use of the semantic web for medical applications at another conference. This work