Asee peer logo
Well-matched quotation marks can be used to demarcate phrases, and the + and - operators can be used to require or exclude words respectively
Displaying all 14 results
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2010 Annual Conference & Exposition
Authors
C. Richard Helps
Tagged Divisions
Information Systems
knowledge of the field and also investconsiderable effort and resources in updating their technical curricula and laboratories toaccommodate these new developments in their field. Therefore instructional design in thisenvironment needs to respond to this continually changing technical landscape. Page 15.1109.1On the other hand, faculty tenure and promotion decisions in computing disciplines arefrequently based on successful research and peer-reviewed publication. Upgrading curricula isseldom well recognized and rewarded for faculty in higher education academic environments.Thus, updating of curricula places additional stress on busy faculty members
Conference Session
IT-based Instructional Technologies
Collection
2007 Annual Conference & Exposition
Authors
Hugh Jack, Grand Valley State University
Tagged Divisions
Information Systems
change the docu-ment? What happens if somebody changes a homework problem after it was assigned? Etc.Assuming that the future of the electronic book is on-line there are currently two popular models.In the Distribution model there are a small number of authors and editors who control and distrib-ute a fixed or editable format for the book. This model most closely resembles the current publish-ing model. In the open model the book would be on a Wiki or Content Management System(CMS) where multiple editors and contributors could freely change it. The open model has greatpotential to generate excellent electronic books, but it adds some new considerations not previ-ously encountered. The paper discusses some of the anticipated issues such as
Conference Session
Computing Curriculum
Collection
2006 Annual Conference & Exposition
Authors
Michael Bailey, Brigham Young University; Barry Lunt, Brigham Young University; Gordon Romney, Brigham Young University
Tagged Divisions
Information Systems
Pusey’s statement concerning funding for a computer laboratory:“Harvard did not get to be where it is by spending old money on new things.”3It is possible that the Second World War delayed the academic progress of computing bydiverting academics such as Vannevar Bush and John von Neumann into national service;however the government resources that continued to be poured into computing followingthe war followed these scholars and others back to university laboratories upon theirreturn. The result was thriving university research at facilities that were well connected.The first academic computer activity consisted of course offerings to graduate studentsfollowing the war. At MIT, Caldwell began teaching a course in digital computers in theelectrical
Conference Session
Emerging Information Technologies
Collection
2009 Annual Conference & Exposition
Authors
C. Richard Helps, Brigham Young University; Bret Swan, Brigham Young University
Tagged Divisions
Information Systems
. How
were
the
categories
determined?

Was
there
no
concern
regarding
economics?

R06 Page 14.266.10 How
about
tools
to
enhance
homework
and
study?
 It
must
have
been
hard
not
to
jump
in
and
propose
technologies
and
gadgets.

They
R07 are
keeping
to
their
plan.R10 How
do
you
collect
prototype
user
data?

Auto?

Track
clicks?R11 Preliminary
research
is
tough
to
call
a
“project.” I
would
have
expected
a
little
more
concrete
of
a
direction
by
this
point
in
the
year.


R12 To
get
from
here
to
a
finished
product
looks
like
a
lot.Table 2. Comments from IAB members and faculty at the mid-year
Conference Session
POTPOURRI
Collection
2010 Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Kirk Love, Utah Valley University; Paymon Sanati-Mehrizy, University of Pennsylvania; Reza Sanati-Mehrizy, Utah Valley University
Tagged Divisions
Information Systems
engineering andcomputer science. Social influences, family influences, peer influences, fundamentalpsychological differences, and motivational issues have all been broken down, dissected, andresearched on numerous occasions. Typically, solutions call for 8, 9, 10:≠ Improved mentoring.≠ Increasing student exposure to professional women in computer science and engineering.≠ Providing a better sense of opportunities in computer science and engineering to young women.≠ Big sister programs.≠ Attempts to promote a larger feeling of belonging among the community of women involved in computer science and engineering.Studies have suggested the implementation of new improvements to curriculums, yet enrollmentsof women in computer science
Conference Session
Information and Network Security
Collection
2008 Annual Conference & Exposition
Authors
Barry Cumbie, Auburn University; Chetan Sankar, Auburn University; P.K. Raju, Auburn University
Tagged Divisions
Information Systems
communities without such requirements. A policy of thisscope would require a massive amount of resources to identify, locate, and in many cases re-create critical data and information. The data and information would then need to be integrated,periodically updated, and made to be accessible even directly after a disaster. Although thefocus group determined an ordinance to be the best course of action, achieving this goal was notnecessarily perceived to be a reality.Educational ImplicationsUniversity faculty can address these issues not only directly in discussions with their students butalso, in their research and service roles, in their communities. During the Spring of 2008 astudent team enrolled in a upper level business-engineering crossover
Conference Session
POTPOURRI
Collection
2010 Annual Conference & Exposition
Authors
Edward Gehringer, North Carolina State University
Tagged Divisions
Information Systems
theburden on the faculty to come up with more new questions. An instructor at a large publicuniversity in the West told us, Without a large test data bank students team and eventually have a printed copy of all exam questions. Again, good for covering material but not really good for an individual assessment.In summary, there is wide concern over the integrity of online exams. Problems can bemitigated, though not eliminated, by proctoring the exam. But as will be seen in Section 4,most students do not believe that OBOW exams are more susceptible to cheating than paperexams. Page 15.927.12Proceedings of the 2010 American
Conference Session
Emerging Information Technologies
Collection
2009 Annual Conference & Exposition
Authors
Stephen Gilbert, Iowa State University; Pam Shill, Iowa State University; Kevin Saunders, Iowa State University
Tagged Divisions
Information Systems
interns, helping the faculty and graduatestudents with ongoing projects. This approach is valuable, but can lead to a sense of isolation ifthe participants cannot easily reflect with each other on their new experience. Other programsassign small groups of students to labs in order to decrease the potential for isolation. Thisresearch reports on the structure of a highly-successful REU site with a relatively rareconfiguration: 15 participants are co-located in a single lab but grouped in teams of three, andeach team works on an existing research project. This approach attempts to establish a intenselearning community1,2 within the REU, as discussed by other REU Site principle investigators3 inwhich students learn not only the relevant research
Conference Session
IT-based Instructional Technologies
Collection
2010 Annual Conference & Exposition
Authors
Yi-Cheng Chen, Meiho Institute of Technology; Yi-Chien Lin, Meiho Institute of Technology; Ron Chuen Yeh, Meiho Institute of Technology, Taiwan; Kuo-Hung Tseng, Meiho Institute of Technology
Tagged Divisions
Information Systems
suggestedthat educational institutions should place more emphases on the fundamental courses to cultivatestudents with essential skills/knowledge and capabilities to cope independently with highlychangeable business environment.On the other side, some of the interviewed faculty members of the IT department signified thatuniversity-level IT education should emphasize more on an in-depth knowledge of howemerging EC technologies can be applied by business firms as well as an in-depth understandingof databases management systems, systems analysis and design, implementation, integration andmanagement issues. The comparison between the IT curriculum and the survey results showsthat many of the important topics were not extensively taught, for example
Conference Session
Security
Collection
2006 Annual Conference & Exposition
Authors
Tim Lin, California State Polytechnic University-Pomona; Saeed Monemi, California State Polytechnic University-Pomona
Tagged Divisions
Information Systems
Unix systemsince it keeps spawning new process until it consumes all the system resources (I have not triedpersonally myself this one yet. It is a good stage 2 assignment or project).main () {while (1) fork () ; }I have the same dilemma and also someway that I need to clarify to the system administrators orthe other instructors teaching network security when I ask them “what is the procedure to loginto a system programmatically?”, “how many routers are in the network, are they passwordprotected?”.The concern is not only “why do you need this information?” but also “are you sure yourstudents will not use such information to work against us?”.Teach students how to monitor and also how to experiment attack in a controlled environment(not always
Conference Session
Emerging Information Technologies
Collection
2007 Annual Conference & Exposition
Authors
John Pickard, East Carolina University; Philip Lunsford, East Carolina University; Chip Popoviciu, Cisco Systems, Inc.
Tagged Divisions
Information Systems
"Deploying IPv6 Networks" book. Page 12.988.1© American Society for Engineering Education, 2007 IPv6 Course Development for Information Technology CurriculumsAbstractThe integration of the Internet Protocol version 6 (IPv6) into networks and interest in itscapabilities are picking up pace yet most networking courses in Universities currently presentonly a brief overview of the new protocol. We present a case study of a special topics course onIPv6 taught during the summer semester of 2006. Issues that are addressed include instructortraining, textbook selection, equipment compatibility, lab
Conference Session
Information and Network Security
Collection
2009 Annual Conference & Exposition
Authors
Nestor Osorio, Northern Illinois University; Andrew Otieno, Northern Illinois University
Tagged Divisions
Information Systems
also learn about new approaches for teachingengineering topics.Accreditation boards, university administrators, department heads, and teaching faculty can findvaluable information about how to implement assessment programs in engineering andtechnology programs in this database. Students at all levels working on their research papers intechnical related areas will find out, for example, how to utilize equipment in a lab environment.The general public would also benefit. As indicated earlier, the formation of a diverse andhighly-capable technical workforce is key for the healthy social and economic future of thecountry. This database can provide the general public information about efforts to improvetechnical education.Technical Functionality of
Conference Session
DB & Information Integration
Collection
2006 Annual Conference & Exposition
Authors
Ed Crowley, University of Houston; Cheryl Willis, University of Houston
Tagged Divisions
Information Systems
illustrateimportant conceptual issues. Table 1-2 provides a brief description of some of the Open Sourcetools that we have employed.Tool Brief DescriptionNessus Nessus automates the discovery of known, local and remote, security vulnerabilities. It identifies vulnerabilities by the CVE standard number. Nessus utilizes a client/server architecture with a Linux/Unix compatible server module. Both Windows and Unix clients are available. Nessus versions, prior to V3, are available for distribution under the GPL.4Ethereal Ethereal a GUI based network protocol analyzer enables you capture and interactively browse packet data from a live network. It also enables
Conference Session
IT-based Instructional Technologies
Collection
2009 Annual Conference & Exposition
Authors
Peng Li, East Carolina University
Tagged Divisions
Information Systems
virtual machines. Only one pre-built virtual machine (VM) wasprovided due to the concern that some students’ computers might not be powerful enough to runmore than one VM. The single VM acted as the server or the target, on which the students set upintrusion detection systems such as Snort and Bro. The host computer acted as the client or theattacker, on which students ran Nmap to scan the virtual machine or ran Wireshark to sniff the Page 14.771.4traffic on the virtual network. In 2006, virtualization was still a relatively new concept to manystudents. However, our students adapted well and the initial trial was a success1.In fall 2007, a