theinformation about EC curriculum planning in well-known universities in Taiwan (e.g., NationalSun Yat-Sen University). We reviewed the related EC research literature and recommendedAssociation for Computing Machinery (ACM) curriculum documents, such as IS 2002, “modelcurriculum and guidelines for undergraduate degree programs in information systems”, CC2005,“the overview report including the guide to undergraduate degree programs in computing”, andMSIS 2000, “model curriculum and guidelines for graduate degree programs in informationsystems” to find out critical EC knowledge topics which are critical for university-level E-commerce education in Taiwan. Based on the intensive literature review and several rounds ofin-depth interviews with domain
2006-1831: SECURITY EDUCATIONTim Lin, California State Polytechnic University-PomonaSaeed Monemi, California State Polytechnic University-Pomona Page 11.1109.1© American Society for Engineering Education, 2006 Security EducationAbstract:Network security and computer security are usually hot topics whenever any intrusion incidentscause system crash and loss of work time in big corporations. In engineering colleges howeversecurity is usually a topic with least or incompatible attention.The author has taught many upper division classes in college and also graduate course(s) and hasbeen trying to imbue and enhance the courses with the security
computer forensics education tosenior undergraduates and graduate students in computer science, software engineering,computer engineering, management information systems, and criminal justice programs.Courses include the basic Introduction to Computer Forensics course offered for threehours credit every Fall semester, and different special topics classes for graduate studentsin more advanced forensics technologies and research topics. The Introduction toComputer Forensics class has been offered six times since 2003, and since the lawenforcement training was started has been enhanced tremendously by much more activelearning activities. During the most recent semester, university students were tasked tocreate digital evidence, investigate and
work was begun on The Overview Report (2001), there was no official body ofIT programs, nor any formal IT curriculum. However, this changed in December of 2001 as thefirst Conference on Information Technology Curriculum was held, which resulted in the creationof the Society for Information Technology Education (SITE), as well as committees for definingIT accreditation and an IT curriculum.IT accreditation standards progressed quickly, and outcomes were posted for public review in2004. These outcomes have been approved for use in a pilot accreditation visit which took placein November 2005. Additionally, general outcomes were approved for accrediting of generalcomputing programs; these outcomes have been used for accreditation of three IT
areas, except Computer Science and Information Systems. InUnited States, many educational institutions developed information security assurance (ISA)educational models based on standards and guidelines promoted by the government or otherorganizations resulting in a large variety of information systems security education curricula [1].In 2005, the ACM Special Interest Group for Information Technology Education (SIGITE)Curriculum Committee developed a list of the topical areas for the information assurance andsecurity (IAS) domain of the information technology body of knowledge [2]. The topical areas Page 12.226.2include: • Fundamental Aspects
. Fullyexploiting the power of these systems, however, is a significant challenge. We are developing ahigh performance computing and cyberinfrastructure signature area, and as part of this effort,working to develop a flexible world-class laboratory that can be used for both research andeducation. The goals of this effort are to: (a) educate a cohort of students from backgrounds incomputing and the domain sciences in the development, deployment, and use of highperformance computing and cyberinfrastructure systems; (b) establish a research facility tosupport discovery in high performance computing, cyberinfrastructure, and bioinformaticsamong a group of faculty and graduate students; and (c) seek new ways to effectively andefficiently share and leverage
and practices, admissions and graduation requirements, advising, research opportunities, retention, and minority groups. Topics relating to faculty include specific teaching methods, publications and research methods, hiring, promotion, tenure, and strategies and tools used in the classroom. Practitioners and alumni address subjects relating to industry and collaborations. Assessment and evaluation refer to improving specific courses as well as overall engineering programs, plus distance learning, design, and ethics courses. Other topics include history of engineering education, and education and learning theory. Taken together they comprise the foundational subjects of engineering
geospatial technology courses are availableto all university students and have been attracting students from a variety of majors. Because ofthe depth and breadth of geospatial applications, the design of the new BS program proposalintegrates topics in Geographic Information Science as delineated in the UCGIS Book ofKnowledge1 with general education, professional minors and free elective choices.In a world where computing, network access, and data sensors are ubiquitous, today’s studentsand researchers are already capitalizing on the abundance of raw data. The capability toeffectively summarize and draw inferences to transform this raw data into useful knowledge iscritical in many undergraduate curricula. The pressing global issues in today’s world
AC 2009-1628: DO INTROVERTS PERFORM BETTER IN COMPUTERPROGRAMMING COURSES?Kyle Lutes, Purdue University Kyle Lutes is an Associate Professor for the Department of Computer & Information Technology (CIT) at Purdue University. Kyle joined the department in 1998 and is the chair of the department’s software development curriculum. His teaching and scholarly interests cover a broad range of software development areas including software applications for mobile devices, data-centered application development, and software entrepreneurialism. He has authored/co-authored numerous papers and two college textbooks on various software development-related topics. Prior to his current
Computer Science degree at UVSC is accredited by ABET in 2002 and currentlyhas 869 students.The Bachelor of Science in the Computer Science program was one of the first Bachelor ofScience programs implemented at UVSC in 1993. The program’s goal has been to provide aquality program that meets accreditation standards while providing the students with a skill setthat allows them to succeed in computing careers.Curriculum for Embedded Systems Engineering Area of Specialization In order to graduate with a Computer Science degree at UVSC, students must complete 123 semester hours of course work. The current curriculum consists of 30 hours of General Education and 10 hours of science requirements that must be taken by all the different areas of
AC 2009-1683: INCORPORATING PARALLEL COMPUTING IN THEUNDERGRADUATE COMPUTER SCIENCE CURRICULUMAfsaneh Minaie, Utah Valley UniversityReza Sanati-Mehrizy, Utah Valley State College Page 14.722.1© American Society for Engineering Education, 2009 Incorporating Parallel Computing in the Undergraduate Computer Science CurriculumAbstractParallel and distributed computing are subjects generally reserved for graduate programs. Withthe design of the multi-core architecture, it is essential that parallel design of software beintegrated into the undergraduate computer science curriculum. Parallel programming representsthe next turning point in how software
of Pennsylvania studying Biology. His research area of interest includes the Demographics found within the Education System, particularly relating to underrepresentation of particular groups in the Sciences. After graduation, Paymon hopes to attend Medical School.Reza Sanati-Mehrizy, Utah Valley University Reza Sanati-Mehrizy is a professor of Computer Science at Utah Valley University. His research interests include Data Structures, Data Bases, and Data Mining. Page 15.1020.1© American Society for Engineering Education, 2010 Recruitment and Retention of Women in Computer Science &
System Software, can be used to integrate the A+ certificate objectives which alsoinclude a networking components, while IS 2002.6 can be used to integrate a networkingcertificate objectives. There are two popular networking certificates which can be integrated intoone or two networking courses; these are Cisco CCNA and CompTIA Network+. Whichcertificate to choose depends on the local market needs as well as the educational philosophy ofthe institute. Community colleges in the US seem to prefer a vendor independent certificate suchas Network+. If the program has a track in network it is possible to integrate both certificates inthe curriculum. The two certificates objectives share some common topics such as OSI model,TCP/IP, and Ethernet
process, the student electronicportfolio, and the laptop-based campus as well as wired classrooms form the infrastructure thatsupports the APM.The APM includes learning outcomes at all stages in the student’s academic life. The curriculumat ZU involves three main programs: The readiness program The general education program The degree majors programs Page 12.275.3The readiness program is a prerequisite for students to be admitted to general education.Students must satisfy competency in English, basic mathematics and Information Technology.Students spend two years in the general education program and the last two years in a major
is anticipated that such a curriculum will reducestudents’ fear of programming and renew their interest in the computing field in general as wellas the IS/IT field in particular.IntroductionAcademic institutions in the US and elsewhere aspire to generate an IS/IT curriculum that canproduce graduates with critical skills required by business and government as well as provide theneeded general education1. Currently, the IS 2002 recommendations form the blueprint forcurriculum development of IS majors2. An important part of the IS curriculum is problemsolving and programming. As a matter of fact the IS 2002 recommendations not onlyacknowledge the importance of problem solving in the curriculum but it requires an embeddedapproach to introducing
sequencethat covers application development, systems architecture, analysis and design, and datamanagement. Additional coursework includes significant composition and speaking courses,accounting and economics, physics and electrical engineering technology, and liberalarts/general education content.The program is ever evolving to meet the changing needs of the IT industry. Periodically, a fullscale curriculum review is undertaken to make broader ranging curriculum changes. This paperdocuments the findings of the most recent review and the changes made in the curriculum as aresult.The general industry trends noted are well documented in scholarly work and the popular press.Information about the requirements of our graduates was collected informally
were not considered for this study but it is interesting to note that graduate levelcourses follow the same basic patterns discovered in the undergraduate courses.In this study, we discovered four different teaching models used by different universities toteaching data mining at the undergraduate level. These four different models are:Mathematical/Algorithm Based, Textbook Based, Topical Based, and Applied Data Mining. Ofthe nine schools we researched, five followed the same pattern. The remaining four schools aredivided among three different approaches as showed in figure 1. Page 15.646.2 Mathematical
AC 2007-2819: DEVELOPING BASIC CRYPTOGRAPHY LAB MODULES WITHOPEN SSLEd Crowley, University of Houston Page 12.490.1© American Society for Engineering Education, 2007 Developing Basic Cryptography Lab Modules with OpenSSLPerceived topic: Innovative TeachingKeywords: Security, Cryptography, Open Source, Lab Development, NetworkingWhile there has been a recent proliferation of quality cryptography texts, there remains ashortage of quality applied laboratory exercises and related support materials. In part, thisis due to the cost and availability of commercial cryptographic software. In part, this isdue to the time and resource commitment required to develop laboratory
content but also the critical practices ofworking as a team and taking initiative to study whatever is necessary to address a challenge.While such a configuration is not physically possible in all research contexts, these results offerthe reader key insights into building an REU experience that successfully uses teams andmotivates faculty and graduate students to be strong mentors. Page 14.1255.2The Structure of the REU Site: SPIRE-EITSPIRE-EIT (Summer Program for Interdisciplinary Research and Education – EmergingInterface Technologies) at Iowa State University is a 10-week interdisciplinary summerexperience for 15 undergraduates that integrates
of specialization while it can be an elective for the other areas. Page 14.704.2 Proceeding of the 2009 American Society for Engineering Education Annual Conference & Exposition Copyright © 2009, American Society for Engineering EducationThe following sections outline the Database Engineering curriculum and then the content of thenew Data Mining course will be presented.Database Engineering CurriculumCurrently, our Computer Science department is offering a Database Area of Specializationwithin computer science program. In order to graduate with a Computer Science degree, studentsmust complete 123 semester
Page 11.346.6that time there. The description of topics of the department’s studies matches what onewould expect of such a hybrid: psychology, business, accounting, digital logic, systemsprogramming, linguistics, and indexing, grouping and searching of information.11 Likeother early CS programs, this hybrid was formed out of the mathematics and electricalengineering departments, with graduate offerings preceding undergraduate ones. Aglance at the current Ohio State catalog shows that CS has remained in the engineeringcollege, while IS has migrated to business.12At the University of Pittsburgh, IS emerged from library science in 1968 as a part of thenewly formed Graduate School of Library and Information Science, and then becameindependent in
from computer science. • TOX 415, Environmental Toxicology and Chemistry, is a senior-level course. • COM 598W, Gaming and Social Networks, was a masters-level special-topics course offered in the Communication department. • HI 216 is a freshman course on Latin America since 1826. • HI 453/553 is a dual-listed advanced undergraduate/graduate course on the U.S. and Latin America.In the two computer science and engineering courses, students were assigned a topic of currentinterest that was not covered in depth in the course. For example, the parallel-architecture classwas assigned topics such as cache organization in multicore architectures; and a comparison ofSCI, the Scalable Coherent Interface, with the
AC 2010-1663: MOBILE AND WIRELESS NETWORKS COURSEDEVELOPMENT WITH HANDS-ON LABSHetal Jasani, Northern Kentucky University Hetal Jasani is an assistant professor in the Department of Computer Science at Northern Kentucky University. His research interests include mobile and wireless networks, distributed systems and network security. He teaches graduate and undergraduate courses in the area of computer networking including mobile and wireless networks and network security. He received the Ph.D. from Florida International University in 2006. Page 15.875.1© American Society for Engineering Education
examples. Capstone courses in mechanical engineering have included projects that require either the design or the design and manufacture of a project’s solution. Courses in civil engineering generally emphasize only the design. Many capstone courses in electrical and computer engineering include design, fabrication, and testing of a product. Chemical engineering capstone courses focus mainly on experimental research.” (Citations from original article omitted) In 2005 Howe and Wilbarger followed up the 1995 study with a second comprehensive nationalstudy2 where they list the primary concerns or topics of programs in engineering and technologyoffering capstone experiences. Table 1 shows these topics ranked by frequency of
-mail them to those who are still working on the exam.This paper covers online exams in general, but focuses on a particular kind of online exam,the “open-book open-Web” (OBOW) exam. This has major implications for academicintegrity. An online exam does away with a lot of opportunity for cheating (the kind ofcheating that involves consulting unapproved materials or devices), but raises new Page 15.927.2possibilities, such as electronic communication between students during the exam. In laterProceedings of the 2010 American Society for Engineering Education Annual Conference & Exposition 1Copyright ∏ 2010, American Society for Engineering
development and network engineering technology. She has co-authored a textbook, edited a second textbook, and written five chapters for other texts. She has published two journal articles and over twenty referred articles and has written or co-authored numerous grants aimed at increasing the number of women students in CIT. She serves as an Associate Editor for the International Journal of Information and Communication Technology Education. She has been the recipient of numerous teaching awards at the department, college, and university levels. She is actively involved in the academic alliance for the National Center for Women & Information Technology (www.ncwit.org), served as
AC 2008-2882: NETWORK PROCESSES COMMUNICATION: CLASS PROJECTSMohammad Dadfar, Bowling Green State University MOHAMMAD B. DADFAR Mohammad B. Dadfar is an Associate Professor in the Computer Science Department at Bowling Green State University. His research interests include Computer Extension and Analysis of Perturbation Series, Scheduling Algorithms, and Computers in Education. He currently teaches undergraduate and graduate courses in data communications, operating systems, and computer algorithms. He is a member of ACM and ASEE. Page 13.925.1© American Society for Engineering Education, 2008 Network
AC 2008-2843: A WORLD WHERE EVERYTHING IS AUTOMATED: THECHALLENGES AND OPPORTUNITIES OF THE ROBUST RFIDINFRASTRUCTURE THAT WILL MAKE IT A REALITYOkechi Egekwu, James Madison University Okechi Geoffrey Egekwu obtained his PhD in Industrial & Systems Engineering from the University of Nebraska, Lincoln. He is currently a Full Professor in the Integrated Science and Technology (ISAT)program at James Madison University, Harrisonburg, VA, where he teaches undergraduate and graduate courses in the manufacturing and technology management areas. He also teaches operations management at MBA programs at James Madison University (JMU) and Eastern Mennonite University. Professor Egekwu worked in industry
2006-2516: OPEN SOURCE SOFTWARE AND LIVE LINUX CDS: ELEMENTS OFSUCCESSFUL LAB MODULESCheryl Willis, University of HoustonEd Crowley, University of Houston Ed Crowley, a former IS Director, developed the four course security specialization at UH’s College of Technology. This is the only NSA/CNSS certified (4011/4014) program in Houston. Mr. Crowley holds multiple INFOSEC certifications from the National Security Agency (NSA). He has also earned the usual vendor certifications from Cisco, CompTIA, and Microsoft. In addition to having held governmental security clearances, he is a graduate of the Military Police Academy