Asee peer logo
Well-matched quotation marks can be used to demarcate phrases, and the + and - operators can be used to require or exclude words respectively
Displaying results 1 - 30 of 36 in total
Conference Session
Cyber Technology
Collection
2019 ASEE Annual Conference & Exposition
Authors
Kristen Przyborski, University of New Haven; Frank Breitinger, University of New Haven; Lauren Beck, University of New Haven; Ronald S. Harichandran, University of New Haven
Tagged Divisions
Computing and Information Technology
unprecedented connectivity andconvenience, it also has the potential to expose them to a variety of threats and manipulations.Internet security on college campuses has become a primary concern of those tasked withprotecting campus networks. We developed a “Cyber World” version of our team-taught first-yearexperience course at the University of New Haven with the intent of introducing students toimportant cybersecurity concepts. In comparison with other topics taught during the samesemester, students reported a greater level of knowledge in topics of identity theft, safe practicesfor online transactions, fake news, and information oversharing. A pilot online module related tolectures and class activities was well received and supports the increased use
Conference Session
Tools and Techniques
Collection
2018 ASEE Annual Conference & Exposition
Authors
Karen H. Jin, University of New Hampshire; Michael Jonas, University of New Hampshire; Christopher David LeBlanc, University of New Hampshire; Theodore Sean Tavares, University of New Hampshire
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
research in speech technology.Prof. Christopher David LeBlanc, University of New Hampshire Christopher D. LeBlanc is currently the Program Coordinator and Assistant Professor for the Engineering Technology program at the University of New Hampshire Manchester campus. Prior to his faculty ap- pointment he spent 16 years at International Business Machines (IBM) as an Analog Mixed Signal design engineer.Prof. Theodore Sean Tavares, University of New Hampshire The author is an Assistant Professor in the Mechanical Engineering Technology Program located at the Manchester campus of the University of New Hampshire. He has held this position since the fall of 2014 following more than 20 years of industry experience. His
Conference Session
Computing and Information Technology Division Technical Session 5
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Bin Cong, California State University at Fullerton; Christopher Ryu, California State University at Fullerton; Raman Menon Unnikrishnan, California State University at Fullerton
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
improvement transcended the strictcurricular boundaries. Many of the changes made were in the process of assessment andevaluation. The process initiated in 2016 and 2017 was improved in 2018 and 2019. The“One-Stop ABET website,” and our refined data collection and analysis tools helped thefront end of the assessment process. The efficiencies of these improvements provided moretime to the faculty to deliberate issues related to evaluation and implementation.The new assessment system defines key performance indicators (Table 2) that are related to theessential core of the computer science discipline. These indicators are used to demonstratecompliance with the SOs. A Traceability Matrix (Table 3) is used to show the relationship amongcourses
Conference Session
Computing Research
Collection
2018 ASEE Annual Conference & Exposition
Authors
Mariangely Iglesias Pena, Iowa State University; Stephen B. Gilbert, Iowa State University; Jamie Payton, Temple University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
. But there are multiple secondarystakeholders whose needs the PI must consider, including: program coordinators who may assistthe PI, faculty project mentors, graduate student mentors, the REU interns themselves, and NSFprogram directors. The REU PI Guide design effort focused on providing PIs with resourcesneeded to satisfy the needs of all stakeholders satisfactorily.Goals of the REU PI GuideA primary goal of the REU PI Guide was to significantly smooth the process of running REUsites for new PIs. Sometimes due to federal budget delays, PIs receive their new REU site awardwith very short notice, and the first REU summer may be organized with a more ad hoc approachthan desired. Ideally the REU PI Guide would help avoid this situation and
Conference Session
Computing and Information Technology Division Technical Session 1
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Abdullah Azzouni, Oregon State University; Jennifer Parham-Mocello, Oregon State University
Tagged Divisions
Computing and Information Technology
accreditation use thecurriculum portion of the accreditation report to improve their curriculum [23]. CI of curriculumalso generates data that benefit other CI components. Changes and improvements in a curriculumhighlight both required and outdated faculty skills [24], [32]. A computing program can helptheir faculty acquire those skills or hire new faculty members who already have them. Reviewingand improving the curriculum can also alter required course objectives [13], [25], [31], [36].Courses are potentially eliminated, or their expected outcomes are modified. There is also thepotential of program or department goal modification recommendations based on the curriculumCI process [36]. A curriculum is how a computing department implements its vision
Conference Session
Computing & Information Technology: Curriculum and Assessment
Collection
2018 ASEE Annual Conference & Exposition
Authors
Predrag T. Tosic, University of Idaho; Julie Beeston, University of Idaho
Tagged Divisions
Computing and Information Technology
readily justifiable); importantly, the core objectives of the newprogram are rather different from those of either the existing Statistics BS/BA program, or theexisting Data Science track within the Computer Science program. For these reasons, there waslittle concern about potential negative impact on any of the existing programs; however, severalfaculty shared concerns about (primarily faculty/instructional) resources for the new program.Therefore, those in charge of the curriculum development for the new program were advised, tomaximize utilization of the existing courses and related resources already provided byDepartment of Mathematics and Statistics, School of EECS, College of Business and otheracademic units participating in the new data
Conference Session
Cyber Technology
Collection
2019 ASEE Annual Conference & Exposition
Authors
Nikunja Swain P.E., South Carolina State University; Biswajit Biswal, South Carolina State University
Tagged Divisions
Computing and Information Technology
security problems, balancing business concerns, technical issues and security. ▪ Effectively communicate technical information verbally, in writing, and in presentations. ▪ Use appropriate resources to stay abreast of the latest industry tools and techniques analyzing the impact on existing systems and applying to future situations. ▪ Explain the concepts of confidentiality, availability and integrity in Information Assurance, including physical, software, devices, policies and people. Analyze these factors in an existing system and design implementations.These concentration outcomes enable CAC of ABET learning outcomes for computer science andcybersecurity. Some of the practices that are used in these courses
Conference Session
Computing and Information Technology Division Technical Session 9
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Wendi M. Kappers, Embry-Riddle Aeronautical University, Daytona Beach; Martha Nanette Harrell, Arkansas Tech University
Tagged Divisions
Computing and Information Technology
forbusiness opportunities, improve efficiency, reduce costs, increase revenue or market share andinspire a vision for the organization [4][5]. The CEO is concerned about organizational success,financial issues, operational processes, and business risk. The CEO position must view theorganization from a bird’s eye view to determine why the organization exists and what theultimate goals are. When it comes to information security, however, the CEO is typically only apart of a team that makes final business and information security decisions and asks questionssuch as, “Should the information security project be funded? Is this information security strategya good fit for this organization? Are the costs (i.e. time, money, resources) for the
Conference Session
Computing and Information Technology Division Technical Session 5
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Shinelle Hutchinson, Purdue University, West Lafayette; Yung Han Yoon, Purdue University, West Lafayette; Neesha Shantaram; Umit Karabiyik, Purdue University, West Lafayette
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
suited for collecting and analyzing this data? What data do these devices share witheach other? Are there any privacy concerns when using these devices? Are there any securityvulnerabilities when using these devices? Finding answers to these questions will considerablyreduce the amount of time investigators spend collecting evidence during a case. New IoT devicesare always becoming available and the research into each cannot keep up. As such, there is a gapin the literature regarding both the privacy and security of these devices and the most efficientmethods to investigate them. Therefore, in this study, we aim to address this need by first buildingour own IoT forensics laboratory at Purdue University. Several students (undergraduate
Conference Session
Topics in Computing and Information Technology-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Arshia Khan, University of Minnesota, Duluth
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
and retention of women in CS is a problem, this paper onlyGeneral Terms addresses the retention issue.Human Factors Although the gender imbalance is a global problem, in this paper we will use the case of the University of Minnesota, Duluth (UMD)Keywords to introduce the problem more specifically. And we look into theWomen in computing; use of social media to encourage retention problem with the introductory courses [7, 10] in CS at UMD. Everyof women; issues concerning women in
Conference Session
Computing and Information Technology Division Technical Session 8
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Simeon Ntafos, University of Texas at Dallas
Tagged Divisions
Computing and Information Technology
to meetwith an academic advisor to prepare a degree plan for the new major.Around 2014, multiple schools including the School of Engineering and Computer Science andthe School of Management enforced the 2.0 GPA threshold more and more strictly. By 2016,approvals for change of majors to these Schools for students that did not meet the thresholdwere very rare. This extended to change of major requests from one major to another withinthe School of Engineering and Computer Science as well. In the 2017 catalog multiple Schoolssought more control over the process for a variety of reasons, mostly over concerns about theability of the School to accommodate demand for its majors and allocation of resources tomatch growth. The 2017 academic catalog
Conference Session
Computing Research I
Collection
2019 ASEE Annual Conference & Exposition
Authors
Gholam Ali Shaykhian, Florida Institute of Technology; Khalil A. Said, Davenport University; Ghaythah Abdullah Alqarna
Tagged Divisions
Computing and Information Technology
alwaysknowledgeable about business strategy and business leaders are not always knowledgeable aboutIT. Therefore, IT professionals may fail to understand the meaning of several industry driversand business. The barriers of language, terminology, and knowledge issues are a root cause ofIT project failure. Adopting and implementing a change management process, for example,needs good management and leadership capability at all levels of the organization.Leaders who successfully adopted ITIL found ITIL provided savings in operational expenses[40] and excellent customer service [39]. Leadership concerns about ITIL implementation, orany other process model, included cost and the lengthy time to complete. Some executiveshesitated to implement ITIL because of fear
Conference Session
Computing & Information Technology: Curriculum and Assessment
Collection
2018 ASEE Annual Conference & Exposition
Authors
Michael Oudshoorn, Northwest Missouri State University; Rajendra K. Raj, Rochester Institute of Technology; Stan Thomas, Wake Forest University; Allen Parrish, United States Naval Academy
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
: • Assurance that graduates satisfy the student outcomes. • Assurance that graduates have exposure to specific curriculum topics. • Assurance that faculty have appropriate and up-to-date technical skills. • Being engaged as a stakeholder in the accreditation and continuous improvement processes and having the opportunity to influence the curriculum.The institution hosting the ABET accredited program finds value through: • Assurance that the program utilizes a continuous improvement process. • Assurance that the program is appropriately funded and resourced relative to peer institutions who are also accredited. • A tool that may be used to attract new students and faculty. • Demonstration of a commitment to best practice
Conference Session
Computing and Information Technology Division Technical Session 6
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Bonnie Achee, Southeastern Louisiana University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Science. The camp was founded to explore new avenuesfor such and seeks to do so by addressing three concerns: cost, administering a curriculum that isinclusive, i.e. does not require prior experience in the discipline and modeling diversity.Surprisingly, the concern of cost was the easiest to address, thanks to a grant that fully funded thecamp. This allowed the camp to be offered at no cost to the students. While this was the easiesthurdle, it was arguably the most important. By offering free tuition to all, a major economicbarrier was removed. It is noted that the issue of connectivity was beyond the scope of thecapabilities of this project.Another concern was administering a curriculum that is inclusive in that it does not require
Conference Session
Computing and Information Technology Division Technical Session 4
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Afsaneh Minaie, Utah Valley University; Reza Sanati-Mehrizy, Utah Valley University; Benjamin Chambers
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
mandatory for the students. Occasional conflictsare inevitable, but the students need to understand that a portion of their grade for participation isbased on attendance at the weekly meetings. At each meeting, issues associated with the projectwill be discussed and a status report will be provided by the student to the advisor. Students willkeep a daily journal/work log detailing the work that was done, how much time was spent thatday, and any technical details that might be needed for later reference. The faculty advisor keepsnotes of each meeting as well as action items to be accomplished for the next meeting.Reviewing the log sheet from the previous meeting is a great way for the faculty to prepare forthe upcoming one and provides further
Conference Session
Computing and Information Technology Division Technical Session 3
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Briana Marie Bailey; Yujian Fu P.E., Alabama A&M University
Tagged Divisions
Computing and Information Technology
reliabilities.KeywordsObject-oriented design, software development, reliability, student information system 1. IntroductionMany aspects in life have adjusted into a new technology-based world. As aspects become moredigital in our every day lives, it was evident that our Universities/College were going to adjust aswell. In transition to transforming into the new common society, campuses have organized andbuilt several components that allow the students, professors, and faculty to access materialthrough a designated internet browser. As a student who must abide by course room proceduressuch as deadlines, an interrupted server can cause a decline in the student’s overall grade point.In response to unexpected difficulties, the System Information System (SIS), was
Conference Session
Computing and Information Technology Division Technical Session 4
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Awatif Amin, Johnson C. Smith University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
algorithms that learn from the data and make predictions.Machine learning algorithms include supervised and unsupervised learning classifications. Thispaper deliberates the use of algorithms to analyze data from educational institutions to help thempresent more detailed methods to improve the efficiency of recruitment, enrollment, and henceretention.IntroductionThe paper proposed and demonstrates the appropriateness and efficiency of data mining as amethod for studying STEM students’ retention. The research was to apply machine learning anddata mining methods, tools, and algorithms to analyze enrollment data for issues affecting STEMstudents’ retention at Johnson C. Smith University a historically black college. Providing insightinto why students
Conference Session
Topics in Computing and Information Technology-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Farshid Marbouti, San Jose State University; Valerie A. Carr, San Jose State University; Belle Wei, San Jose State University; Morris E. Jones Jr., San Jose State University; Amy Strage
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
- impact programs for first-year students and established a new SJSU Engineering Student Success Center to help engineering students thrive. Most importantly, Wei’s commitment to expanding the sphere for student excellence has produced results that include increased access for women, African Americans, Latinos/Latinas, and other historically underrepresented communities to SJSU. Wei extends her service beyond SJSU through active engagement in national and international organizations. She serves on the Executive Board for the Engineering Deans Council of American Society for Engineering Education, chairing its Committee on Diversity. She has served on several National Science Foundation panels. And she has assumed
Conference Session
Computing and Information Technology Division Technical Session 5
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Anastasia Kurdia, Tulane University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Paper ID #33024CS + X: Coordinate Major in Computer ScienceAnastasia Kurdia, Tulane University Anastasia Kurdia is a Senior Professor of Practice of Computer Science at Tulane University. She re- ceived her undergraduate degree in Applied Mathematics from Belarusian State University, and Ph.D. from University of Texas at Dallas. In her dissertation, she developed new algorithms for studying pro- tein geometry. At Tulane Prof. Kurdia teaches a variety of undergraduate computer science courses and also works on issues in computer science education with concentration on effective teaching and active learning, novel
Conference Session
Computing and Information Technology Division Technical Session 6
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Ciprian Popoviciu, East Carolina University; Philip J. Lunsford II, East Carolina University; John Pickard, East Carolina University; Colby Lee Sawyer, East Carolina University; Jarvis Woodburn; Zachary Ryan Zynda, East Carolina University; Dale Drummond, East Carolina University
Tagged Divisions
Computing and Information Technology
for a broader segment of thepopulation, unencumbered by geographical and socio-economic constraints. The deliveryof such services is rapidly evolving with the inclusion of new technologies and toolsfacilitating a more engaged, context aware and interactive participation. Without the abilityto effectively monitor and manage the reliability, bandwidth, and latency between endpointsas well as key control plane elements such as DNS and call management, the efficacy andacceptance of the technology suffers due to poor user experience. Unfortunately, whenputting together off-the-shelf solutions we are constrained by the operational modelsexpected by various vendors involved. To address the specific needs of such services inDE and DC, we propose
Conference Session
Computing and Information Technology Division Technical Session 8
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Afsaneh Minaie, Utah Valley University; Justin Limb; Reza Sanati-Mehrizy, Utah Valley University
Tagged Divisions
Computing and Information Technology
several iterations, the advisor approves their proposal. The faculty adviserwill meet with each student individually on a weekly basis at a regularly scheduled, mutuallyagreeable time. These meetings are considered mandatory for the students. Occasional conflictsare inevitable, but the students need to understand that a portion of their grade for participation isbased on attendance at the weekly meetings. At each meeting, issues associated with the projectwill be discussed and a status report will be provided by the student to the advisor. Students willkeep a daily journal/work log detailing the work that was done, how much time was spent thatday, and any technical details that might be needed for later reference. The faculty advisor keepsnotes
Conference Session
Wireless Technology
Collection
2019 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Reza Sanati-Mehrizy, Utah Valley University; Kyle Joseph Wheelhouse, Utah Valley University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
researchers are currently resolving. Open research issues andchallenges are identified to spark new interests and developments in this field. However, thedesign of wireless sensor networks introduces formidable challenges, since the required body ofknowledge encompasses a wide range of topics in the field of electrical and computerengineering, as well as computer science [3, 4]. The use of WSNs has improved thefunctionality and smartness of many existing applications.Home Security and AutomationHome security is a growing industry in the world. This industry is getting more popular in theresidential properties because according to Assaf: “A home security system will reduce thechances of intrusion and thus, can protect both lives and property” [5
Conference Session
Computing and Information Technology Division Technical Session 1
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
James K. Nelson Jr. P.E., Texas A&M University; Brent L. Donham, Texas A&M University-Commerce
Tagged Divisions
Computing and Information Technology
member of the American Society for Engineering Education and the SAFE Association. Prior to receiving his Ph.D. in 1983, Dr. Nelson worked as a design engineer in industry and taught as an adjunct professor at the University of Houston and Texas A&M University at Galveston. In industry he was primarily involved in design of floating and fixed structures for the offshore petroleum industry. After receiving his Ph.D., Dr. Nelson joined the civil engineering faculty at Texas A&M University. He joined the civil engineering faculty at Clemson University in 1989 as Program Director and founder of the Clemson University Graduate Engineering Programs at The Citadel and became Chair of Civil Engineering in 1998. In
Conference Session
Curriculum and Assessment I
Collection
2019 ASEE Annual Conference & Exposition
Authors
Karen C. Davis, Miami University
Tagged Divisions
Computing and Information Technology
Award for Women in Engineering Education in 2016. Dr. Davis received a B.S. degree in Computer Science from Loyola University, New Orleans in 1985 and an M.S. and Ph.D. in Computer Science from the University of Louisiana, Lafayette in 1987 and 1990, respectively. c American Society for Engineering Education, 2019 Creating Guided Study Exercises for a Flipped Database Course Karen C. Davis Computer Science and Software Engineering Department Miami University Oxford, OH USA karen.davis@miamioh.eduAbstractThere is a preponderance of
Conference Session
Computing and Information Technology Division Technical Session 3
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Alberto Cureg Cruz, California State University, Bakersfield; Antonio-Angel L. Medel, California State University Bakersfield; Anthony Chistoper Bianchi, California State University, Bakersfield; Vincent Wong On, California State University, Bakersfield; Melissa Danforth, California State University, Bakersfield
Tagged Divisions
Computing and Information Technology
is anexclusion criteria. In Architecture, students learn to code assembly language, binaryrepresentation of instructions, issue path, cache organization, multi-issue, and parallelism (SIMDand loop unrolling). Students gradually improve a processor given new knowledge. In AI,students discuss inference in formal logic (propositional logic, fuzzy logic, probability theory),machine learning (neural networks), and constraint satisfaction (genetic algorithms, evolutionarystrategies, and genetic programming). Students have less time to understand a concept beforemoving on to a new one due to the variety of topics. Unlike Architecture, AI is more: abstract,math-based, and compares algorithms via computational cost. Informed consent for the surveysis
Conference Session
Computing and Information Technology Division Technical Session 3
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Margaret Ellis, Virginia Tech; Catherine T. Amelink, Virginia Tech; Stephen H. Edwards, Virginia Tech; Clifford A. Shaffer, Virginia Tech
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Paper ID #29158Incorporating Practical Computing Skills into a Supplemental CS2Problem Solving CourseProf. Margaret Ellis, Virginia Tech Assistant Professor of Practice, Computer Science Department, Virginia Tech My research interests include examining ways to improve engineering educational environments to facil- itate student success, especially among underrepresented groups.Dr. Catherine T. Amelink, Virginia Tech Dr. Amelink is Acting Vice Provost for Learning Systems Innovation and Effectiveness, Virginia Tech. She is also an affiliate faculty member in the Departments of Engineering Education and Educational
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Jeong Yang, Texas A&M University-San Antonio; Brandon Earwood, Texas A&M University-San Antonio; Young Rae Kim, Texas A&M University-San Antonio; Akhtar Lodgher, Texas A&M University - San Antonio
Tagged Divisions
Computing and Information Technology
evaluateoperands of division operators to avoid attempting to divide by zero. The proposed solution is toperform a check on the value used as the divisor in either division or modulo operations. Theoperation is only performed if this value is not zero.Precision (Module 5 Lesson 2): This lesson focused on exploring the issue with storing decimalvalues in programs using floating-point data types. While these two data types are ideal formaintaining precision, there are cases where accuracy is a larger concern. Since numeric valuesare stored in binary, decimal portions of numbers cannot maintain perfect accuracy. A designapproach to solving this problem is to consider the allowable tolerance of inaccuracies in a givenapplication. One possible programming
Conference Session
Computing and Information Technology Division Technical Session 1
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Mia Minnes, University of California, San Diego; Sheena Ghanbari Serslev, University of California, San Diego ; Madison Edwards
Tagged Divisions
Computing and Information Technology
lack that would prevent them from being hired? Radermacher et al. [18] documented hurdlesfacing recent graduates. They write that the greatest challenges for recent graduates involve effectivelycommunicating with customers and coworkers, using software tools and configuration managementsystems, and creating unit tests for code. Also, the most common issues preventing students fromobtaining a position at a company were a lack of problem-solving abilities and project experience. EricBrechner, Director of Microsoft Development Training, voices similar concerns about the inadequatepreparation of CSE college graduates transitioning to full-time positions and cites the following as areasof needed preparation: software design and analysis; writing
Conference Session
Topics in Computing and Information Technology-I
Collection
2018 ASEE Annual Conference & Exposition
Authors
Kari L. Jordan Ph.D., The Carpentries; Marianne Corvellec, Institute for Globally Distributed Open Research and Education (IGDORE); Elizabeth D. Wickes, University of Illinois at Urbana-Champaign; Naupaka B. Zimmerman, University of San Francisco; Jonah M. Duckles, Software Carpentry; Tracy K. Teal, The Carpentries
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
% to 40% of new graduates in science, technology, engineering, and mathematics(STEM), business, and any field involving quantitative analysis would have to become thesedata-literate managers and analysts, in order to meet the United States demand of two to fourmillion by 2024 [2]. The authors stress the importance of data visualization to support decision-making. To add to the complexity, some workers can and will take on more than one role,especially in small and medium-sized organizations.What we have referred to as ‘workforce needs’ may be more correctly characterized as growthpotential, in the sense that most industries are still capturing only a fraction of the potential valuefrom data and analytics [2]. Beyond considerations about
Conference Session
Poster Session
Collection
2019 ASEE Annual Conference & Exposition
Authors
Vigyan Jackson Chandra, Eastern Kentucky University
Tagged Divisions
Computing and Information Technology
practice can be difficult for students as they attempt tobuild a cohesive understanding of the subject. It also poses a challenge for faculty trying toconvey dense, text-heavy technical information using either the conventional chalkboard orpresentation software. It is easy for the underlying beauty of the concepts to stay hidden underthe jargon-filled landscape. Notes written on the whiteboard or chalkboard by faculty focus onconveying technical content to students, and these may make only limited used of graphicaldesign ideas that can be leveraged for communicating information more effectively. What isneeded is a mechanism for engaging both the students’ imagination and technical skills whilebuilding an understanding of concepts, using