Asee peer logo
Well-matched quotation marks can be used to demarcate phrases, and the + and - operators can be used to require or exclude words respectively
Displaying all 17 results
Conference Session
IT-based Instructional Technologies
Collection
2007 Annual Conference & Exposition
Authors
Julie Mariga, Purdue University
Tagged Divisions
Information Systems
a co-chair of the Birds of a Feather session and on the Program Committee for the 2006 Grace Hopper Women in Computing Conference. She is on the Academic Advisory Committee as well as the Panels, Workshops, & Presentations Committee for the 2007 Grace Hopper Women in Computing Conference. Finally, she serves on the Curriculum Writing Committee for the ACM SIG Information Technology Educators (www.sigite.org) Page 12.1580.1© American Society for Engineering Education, 2007 Utilizing Virtual Software to Provide Hands-On Experience with Systems & Applications Software
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2008 Annual Conference & Exposition
Authors
Azzedine Lansari, Zayed University; Akram Al-Rawi, Zayed University; Abdallah Tubaishat, Zayed Univeristy; Faouzi Bouslama, Université Laval
Tagged Divisions
Information Systems
, mathematics, statistics and business functions. The IS 2002 modelcurriculum also requires an embedded problem solving and critical thinking framework in allcourses. The architecture of the IS model curriculum consists of five presentation areas: Information systems fundamentals Information systems theory and practice Information technology Information systems development Information systems deployment and management processesThe five presentation areas consist of ten courses and one prerequisite. They are: IS 2002.P0 - Personal Productivity with IS Technology IS 2002.1 - Fundamentals of Information Systems IS 2002.2- Electronic Business Strategy, Architecture and Design IS 2002.3
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2007 Annual Conference & Exposition
Authors
Sohail Anwar, Pennsylvania State University-Altoona College; Jungwoo Ryoo, Pennsylvania State University-Altoona College; Harpal Dhillon, Excelsior College; David Barnes, Pennsylvania State University-Altoona College
Tagged Divisions
Information Systems
courseswhich include principles of information security management and advanced securitymanagement. The 18-credit Information Systems Security Certificate offered by the Penn StateUniversity-Altoona College requires completion of four courses which include introduction toinformation systems, organization of data and information assurance, networking fundamentals,and networking security. In addition, upon approval from the Certificate Program Coordinator,students take two other information technology courses. Examples of such courses includesecure web design and computer forensics.This manuscript describes how Penn State University-Altoona College, an undergraduateeducational institution in Pennsylvania is taking steps to integrate the IAS concepts
Conference Session
IT-based Instructional Technologies
Collection
2009 Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Reza Sanati-Mehrizy, Utah Valley State College
Tagged Divisions
Information Systems
developers write software. This paper will study differentapproaches that are used by different institutions of higher education around the world tointegrate parallel computing into their curriculum.Teaching parallel computing concepts to undergraduate students is not an easy task. Educatorsneed to prepare their students for the parallel era.IntroductionA fundamental technique by which computations can be accelerated is parallel computation. Themain reason for executing program instructions in parallel is to complete a computation faster.However, majority of programs today are incapable of much improvement through parallelism,since they have written assuming that instructions would be executed sequentially1. Sincesequential computer performance has
Conference Session
Security
Collection
2006 Annual Conference & Exposition
Authors
Tim Lin, California State Polytechnic University-Pomona; Saeed Monemi, California State Polytechnic University-Pomona
Tagged Divisions
Information Systems
themodules mentioned as appropriately.Dilemma for the educators:With this discussion, we as the educators can run into this dilemma: can you teach the studentson how to break the security holes of a certain system or not?Let me quote the famous author Andrew Tanenbaum from his classic book on OperatingSystem7: “ .. was hesitant to write this section (attack from outside the system) in so much detail,lest it give some people bad ideas. … , the genie is already out of the bottle. In addition it is hardfor people to defend themselves against viruses if they do not know how they work”.A very simple code example as given by Tanenbaum is the one line program from his OS book,chapter 9 on security. According to Tanenbaum, this one line program can kill a
Conference Session
IT-based Instructional Technologies
Collection
2007 Annual Conference & Exposition
Authors
Edward Gehringer, North Carolina State University
Tagged Divisions
Information Systems
through an algorithm) require visual display. In this case, transparencies andpens can be distributed to the groups, which can write their answer on them, and quickly presentit to the class when called upon.20 (A higher-tech way of accomplishing the same thing is to useDyKnow [http://www.dynkow.com], which allows to call up student submissions for display.)Allow students to correct any mistakes;20 that’s less threatening than having the instructor do it.vii. Use colored cards. To get a quick indication of how well a class (especially a large class) isunderstanding some topic, distribute a set of colored cards (e.g., red, yellow, blue) to eachstudent. Pose a multiple-choice question, and have students hold up a particular color to indicatea
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2007 Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley State College; Reza Sanati-Mehrizy, Utah Valley State College
Tagged Divisions
Information Systems
. Thestudents will learn both the fundamental knowledge and the most recent developments in thefield. They will also gain experience in practical applications and the hardware/software co-design of embedded systems technology.Introduction to Embedded Systems (EENG 2730)The goal of this course is to introduce the fundamental concepts of hardware and softwareneeded for the design of embedded systems. This course is oriented toward the engineeringprinciples and techniques of applying microcontrollers in various embedded systems. Thecourse places strong emphasis on hands-on experience with topics, including six labs and adesign project. The students will use 68HC12 Evaluation Boards (16 bit microcontroller) to dotheir labs. Students become exposed to the
Conference Session
Internet and Distributed Computing
Collection
2006 Annual Conference & Exposition
Authors
Fani Zlatarova, Elizabethtown College
Tagged Divisions
Information Systems
WHERE Year = 2005 AND CNo IN (SELECT CNo FROM C WHERE City = ’London’));Practical work with DBMSs, such as Microsoft SQL Server, Oracle, or MySQL, is highlyrecommended. If students are not acquainted with the levels of abstraction respective to thestrategies describes in sections 2.1-2.3, they are not ready to understand the interaction amongtables in multi-table queries, for example. They also would experience significant difficultieswhen writing queries with high complexity and be unprepared to work in a real environmentrequiring query processing. Their employers would
Conference Session
IT-based Instructional Technologies
Collection
2009 Annual Conference & Exposition
Authors
Tal Rusak, Cornell University; Christopher Barnes, Cornell University; G. Scott Russ, Cornell University; Vincent Kam, Cornell University; David Gries, Cornell University
Tagged Divisions
Information Systems
received his PhD from the Technische Hocschule Munchen in 1966 and then served on the CS faculty at Stanford for three years. He has been at Cornell since 1969, except for two years at UGA, and served as the Department Chair in the 1980s. Gries is known for his work in compiler construction and programming methodology and his textbooks in compiler writing, programming, and discrete mathematics. He has received several national/international awards for his contributions to education and is a Cornell Weiss Presidential Fellow, awarded for his contributions to undergraduate education. Page 14.376.1© American Society for Engineering Education, 2009
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2007 Annual Conference & Exposition
Authors
Mario Garcia, Texas A&M University-Corpus Christi
Tagged Divisions
Information Systems
for a usable systemwith the unessential services turned off. By hardening the OS and further securing the system, itwill be ideal to act as a Snort13 sensor. Snort ver. 2.4.3 is installed on this system along withApache, SSL, PHP, MySQL, and BASE.Since a Snort sensor is fundamentally passive i.e. it receives data but does not send any, it makessense security wise to run it in a stealthy mode. Two network interface card’s are used, one formanagement and the other for sniffing. The NIC used for sniffing in stealthy mode is not givenany IP address whereas the NIC used for management is provided with an IP address. The NICwith the IP address is connected to a network different from the sniffing interface foradministrative purposes. Attack free
Conference Session
Emerging Information Technologies
Collection
2009 Annual Conference & Exposition
Authors
Reza Sanati-Mehrizy, Utah Valley State College; Afsaneh Minaie, Utah Valley University
Tagged Divisions
Information Systems
aBachelor’s Degree in Computer Science with four areas of specialization: Computer Science(traditional), Computer Engineering, Computer Networking, and Database Engineering.A study and curriculum comparison has shown that some universities and colleges offer only onedatabase related course in their undergraduate curriculum while others, are offering more thanone course in this field. The reason is that it is impossible to teach all the required subjects(theory, application, administration, etc.) in only one course. Also, experience indicates that thedatabase job market expects our graduates to have enough expertise to be able to install andconfigure their Database Management System, write application programs, design the database,maintain and
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2009 Annual Conference & Exposition
Authors
Thomas Hacker, Purdue University, West Lafayette; Krishna Madhavan, Purdue University
Tagged Divisions
Information Systems
space. with their laptop computers to write lab reports and papers. Figure 6. Collaboration A portion of the room is utilized as student project space. Students in area whiteboarding space. the courses that require access to hardware are assigned resources in the data center laboratory, as well as a set of commodity desktopcomputer systems for their use to complete class projects and research projects. Each studentstation consists of a cart (on wheels), a small gigabit Ethernet switch, monitor, keyboard, mouse,and four Dell Optiplex 260 computers. These project stations are on wheels, and students canwheel them out
Conference Session
Emerging Information Technologies
Collection
2009 Annual Conference & Exposition
Authors
Stephen Gilbert, Iowa State University; Pam Shill, Iowa State University; Kevin Saunders, Iowa State University
Tagged Divisions
Information Systems
of Research, 3rdedition7. This classic introduction to writing a research paper helps students specifically withtheir papers while teaching them what tasks are involved in graduate research more generally.The seminar begins by asking “What is Research?” and asks students to practice evaluating thevalidity of various research sources. Next, with guidance from the instructor and their respectivementors, the Research Project teams define their research questions. The seminar includes a visitto the univeristy library to learn how to use online databases and bibliographic databases(Endnote, Bibtex, etc) efficiently. After the seminar is over, the instructor continues to meetindividually with each Research Project team to check on the progress of
Conference Session
Information Technologies Classroom Instruction
Collection
2008 Annual Conference & Exposition
Authors
Robert MacDonald, Purdue University; Raheel Malik, Whirlpool Corp.; Anthony Smith, Purdue University; James Goldman, Purdue University
Tagged Divisions
Information Systems
protocol, wireless distribution system, and the classic wirednetwork.1. IntroductionThe introduction of wireless networking has allowed people the freedom to access networks,including the Internet, from almost any location. This fact has been reflected, in part, by a surgein laptop sales over the recent years. Vice president of Gartner’s worldwide computingplatforms, Charles Smulders, states that “Consumers are flocking to notebooks because of lowerprices, better performance, and an increased appreciation for wireless technologies.”5 Theincreased appreciation here stems from the transparently bridging technologies. According to anengineer at Qualcomm, “One of the fundamental design goals for 802.11 is to provide servicesthat are consistent
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2009 Annual Conference & Exposition
Authors
Phil Rawles, Purdue University; Anthony Smith, Purdue University; Raymond Hansen, Purdue University; Jeffrey Sprankle, Purdue University
Tagged Divisions
Information Systems
in theprogram take a minimum of twelve hours of written and oral communications with manychoosing to take additional coursework in the area. Communication is enforced throughout theremainder of the curriculum by assigning a significant portion of course points to written reportsin their core NET courses. Although they consistently complain about the required writing, theability to effectively communicate in speech and writing has been proven to serve them well inboth obtaining and advancing in their career.The core of the curriculum can be divided into two main components: network engineering andsystem/network administration and security. The network engineering component focuses on thetechnologies and protocols used to deliver data between
Conference Session
Information and Network Security
Collection
2008 Annual Conference & Exposition
Authors
Richard Smith, U. of St. Thomas - St. Paul
Tagged Divisions
Information Systems
provides the fundamentalmechanism for security. Students are shown how this puts all input/output and memorymanagement operations under the operating system’s control. These mechanisms prevent a userprogram from arbitrarily changing RAM or file contents without prior permission.The concept of processes provides the fundamental concept for understanding the execution ofprograms within a computer. Lower division students aren’t always familiar or comfortable withthinking about processes, but the concept is essential to reasoning about logical protection withina computer. When working above the operating system level, which is the focus of this course,all logical protections are in the context of processes and what those processes are allowed to
Conference Session
IT-based Instructional Technologies
Collection
2008 Annual Conference & Exposition
Authors
Clifton Kussmaul, Muhlenberg College
Tagged Divisions
Information Systems
AC 2008-2218: OPEN SOURCE SOFTWARE TO SUPPORT STUDENT TEAMS:CHALLENGES, LESSONS, AND OPPORTUNITIESClifton Kussmaul, Muhlenberg College Clifton Kussmaul is Assistant Professor of Computer Science at Muhlenberg College, and Chief Technology Officer for Elegance Technologies, Inc. He has a PhD from the University of California, Davis, an MS and MA from Dartmouth College, and a BS and BA from Swarthmore College. His interests include agile development, virtual teams, entrepreneurship education, and cognitive neuroscience, particularly auditory processing. Page 13.952.1© American Society for