Asee peer logo
Well-matched quotation marks can be used to demarcate phrases, and the + and - operators can be used to require or exclude words respectively
Displaying results 1 - 30 of 154 in total
Conference Session
Computing Research
Collection
2018 ASEE Annual Conference & Exposition
Authors
Mariangely Iglesias Pena, Iowa State University; Stephen B. Gilbert, Iowa State University; Jamie Payton, Temple University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Paper ID #22172The Research Experience for Undergraduates (REU) Principal Investigators(PI) Guide: Development of a Best Practices WebsiteMs. Mariangely Iglesias Pena, Iowa State University Mariangely Iglesias Pena is an MS student in Human Computer Interaction at Iowa State University’s Virtual Reality Applications Center. Her background is in industrial design, which drives her interest in interactive and web design.Prof. Stephen B. Gilbert, Iowa State University Stephen B. Gilbert received a BSE from Princeton in 1992 and PhD from MIT in 1997. He has worked in commercial software development and run his own company. He
Conference Session
Computing and Information Technology Division Technical Session 2
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Jeremy Straub, North Dakota State University
Tagged Divisions
Computing and Information Technology
, 2018. [Online]. Available: https://search.proquest.com/docview/1272087912?pq-origsite=gscholar.[5] C. Frank, J. McGuffee, and C. Thomas, “Early undergraduate cybersecurity research,” J. Comput. Sci. Coll., vol. 32, no. 1, pp. 46–51, 2016, Accessed: Sep. 23, 2018. [Online]. Available: https://dl.acm.org/citation.cfm?id=3007235.[6] V. P. Janeja, C. Seaman, K. Kephart, A. Gangopadhyay, and A. Everhart, “Cybersecurity workforce development: A peer mentoring approach,” in 2016 IEEE Conference on Intelligence and Security Informatics (ISI), Sep. 2016, pp. 267–272, doi: 10.1109/ISI.2016.7745487.[7] P. Deshpande, C. B. Lee, and I. Ahmed, “Evaluation of Peer Instruction for Cybersecurity Education,” 2019, doi
Conference Session
Cyber Technology
Collection
2019 ASEE Annual Conference & Exposition
Authors
Kristen Przyborski, University of New Haven; Frank Breitinger, University of New Haven; Lauren Beck, University of New Haven; Ronald S. Harichandran, University of New Haven
Tagged Divisions
Computing and Information Technology
. Hendler, N. Shadbolt, W. Hall, T. Berners-Lee, and D. Weitzner. Web science: an interdisciplinary approach to understanding the web. Communications of the ACM, 51(7):60–69, 2008.[12] T. E. Jacobson and B. L. Mark. Separating wheat from chaff: Helping first-year students become information savvy. The Journal of General Education, 49(4):256–278, 2000.[13] P. Korovessis, S. Furnell, M. Papadaki, and P. Haskell-Dowland. A toolkit approach to information security awareness and education. Journal of Cybersecurity Education, Research and Practice, 2017(2):5, 2017.[14] C. Lestch. College IT experts and students have opposing views on cybersecurity. https://edscoop. com/college-it-experts-and-students-have-opposing-views-on-cybersecurity
Conference Session
Computing Technology Applications-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Vuk Marojevic, Virginia Tech; Antoni Gelonch-Bosch, Universitat Politècnica de Catalunya; Jeffrey Reed, Virginia Tech
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
,  Discuss the pros and cons of alternative technical solutions, and  Debate possible evolutionary paths for the standard being analyzed.We propose six learning stages with specific learning objective in each stage. These aredescribed in continuation.3.1 ContextThe student needs to get familiar with the standard and the standardization mechanics. Theinstructor thus provides a) A high-level description of the standard with certain details, describing theoretical concepts and employed technologies, identifying relevant working parameters and expected system behaviors, b) The standard specifications and the relationships among the main and auxiliary documents, and c) The introduction to the software framework to be used
Conference Session
Computing and Information Technology Division Technical Session 8
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Te-shun Chou, East Carolina University; Biwu Yang, East Carolina University
Tagged Divisions
Computing and Information Technology
section.2. CyberSec LabsIn the learning system, a GUI application was designed to help learners navigate the system [5].In total, eight CyberSec labs were designed: Web defacement lab, Remote secure login lab, FTPserver DoS lab, Patch management lab, Backdoor lab, SQL injection (SQLi) lab, Honeypot lab,and Secure plain text traffic labs. Each lab included two sub-labs (attack and defense) andobjectives were included in each of the labs. Figure 1a displays the GUI application and Figure1b shows the two sub-lab buttons after clicking the Secure remote login lab. Table 1 shows theCyberSec labs and their corresponding objectives.(a) (b) Figure 1. (a) CLaaS GUI application (b) Sub-labs of
Conference Session
Computing and Information Technology Division Technical Session 5
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Hassan Rajaei, Bowling Green State University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
, "SimPlus: An Experimental Simulation Tool", in Proceedings of the 2004 American Society for Engineering Education Annual Conference (ASEE'04), June 2004, Salt Lake City, Utah. Session 2420.8. Rajaei, H. Eid E., Kannungo, D., Ringerberg, J., 2011, "JSimPlus: A Tool for Teaching Simulation Techniques", in the 14th Communications and Networking Simulation Symposium, CNS'11, sponsored by ACM/SCS, April 4-11, Boston.9. Law, A. 2007, “Simulation Modeling & Analysis”, 4th Ed, McGraw Hill10. Harrell C, Ghosh B, and Bowden R, 2012 “Simulation Using ProModel”, 3rd Ed, McGraw Hill11. Chamberlain T, 2013, “Learning OMNeT++, Packt Publisher12. Virdis A, 2019 “Recent Advances in Network Simulation, the OMNeT Environment and its
Conference Session
Computing and Information Technology Division Technical Session 7
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Jeremy Straub, North Dakota State University
Tagged Divisions
Computing and Information Technology
. Behav. Organ., vol. 76, no. 1, pp. 90–112, Oct. 2010, doi: 10.1016/j.jebo.2010.02.015.[15] B. C. Martin, J. J. McNally, and M. J. Kay, “Examining the formation of human capital in entrepreneurship: A meta-analysis of entrepreneurship education outcomes,” J. Bus. Ventur., vol. 28, no. 2, pp. 211–224, Mar. 2013, doi: 10.1016/j.jbusvent.2012.03.002.[16] C. Jones and J. English, “A contemporary approach to entrepreneurship education,” Educ. + Train., vol. 46, pp. 416–423, Oct. 2004, doi: 10.1108/00400910410569533.[17] E. A. Rasmussen and R. Sørheim, “Action-based entrepreneurship education,” Technovation, vol. 26, no. 2, pp. 185–194, Mar. 2006, doi: 10.1016/j.technovation.2005.06.012.[18] U. Hytti, P
Conference Session
Curriculum and Assessment II
Collection
2019 ASEE Annual Conference & Exposition
Authors
Xiannong Meng, Bucknell University; Jianming Deng, Jinling Institute of Technology and Southeast University
Tagged Divisions
Computing and Information Technology
science and IT play increasingly important role in the Chinese economy, just as theydo in the U.S. It is important for all to understand how future computer scientists and engineersare educated in China. References[1] X. Li and B. Lunt, “Undergraduate computing education in China - a brief status and perspective,” in Proceedings of the 7th conference on Information technology education, Minneapolis, MN, USA, October 19 - 21, 2006, New York: ACM, 2006, pp. 35-38.[2] Working Group for Software Engineering Curriculum, Guidelines for undergraduate curriculum of applied software engineering majors, 2016. Original in Chinese, 高等学校本 科软件工程专业应用型人才培养指导意见 2016 年.[3] X. Zhou, “Some historic notes of
Conference Session
Computing and Information Technology Division Technical Session 2
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Ida B. Ngambeki, Purdue University, West Lafayette; Marcus Rogers, Purdue University, West Lafayette; Sienna Jasmine Bates, Purdue University, West Lafayette; Megan Celeste Piper
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Paper ID #34578Curricular Improvement Through Course Mapping: An Application of theNICE FrameworkDr. Ida B. Ngambeki, Purdue University, West Lafayette Dr. Ida Ngambeki is an Assistant Professor of Computer and Information Technology at Purdue Univer- sity. Dr. Ngambeki graduated from Smith College with a B.S. in Engineering and from Purdue University with a PhD in Engineering Education. Dr. Ngambeki’s research is focused on the intersection of human behavior and computing, specifically how educational and policy interventions can be used to improve human interactions with technology. Dr. Ngambeki’s key areas of research
Conference Session
Computing and Information Technology Division Technical Session 3
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Briana Marie Bailey; Yujian Fu P.E., Alabama A&M University
Tagged Divisions
Computing and Information Technology
eight (10) classes, Person, Student, Professor, Admin, StudentLogIn,ProfessoryLogin, Course, Grading, StudentRegistration, Payment and the aggregate classStudentInfSys. While classes Student holds the information of each individual student profile (a) (b) (c) Figure 2. Some classes defined in UML (a) Class Student Login; (b) Class Professor Login; (c) Class Student Registration. © American Society for Engineering Education, 2021 2021 ASEE Conferencewhich includes person info, academic records, financial info, etc.. Class Professor carries theprofessor’s individual info, teaching assignment, and grading
Conference Session
Computing and Information Technology Division Technical Session 6
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Michael Porter, Alabama A&M University; Ralph (Phil) Bording, Alabama A&M University; Yujian Fu P.E., Alabama A&M University
Tagged Divisions
Computing and Information Technology
15th of each month, so itwould have two pay periods for each month.Payment Class: The payment class represents a payment from the company to a payable entity(either an employee or a vendor). The payment includes information about the payment amount,the date of the payment, and a reference to the recipient of the payment. (a) Payment class (b) PayPeriod class (c) PayableEntity class Figure 2. A selected class definition in UML Class model (a) Payment class (b) PayPeriod class (c) PayableEntity class.PayableEntity Class: An abstract class containing information about a potential payee, and theirpayment information. It
Conference Session
Computing and Information Technology Division Technical Session 5
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Shanon Marie Reckinger, University of Illinois at Chicago; Chris Gregg, Stanford University; Bryce E. Hughes, Montana State University Bozeman
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
& Beilock, 2012). There is a lotof evidence that math anxiety robs individual’s working memory (Beilock & Willingham, 2014).The working memory's "space" or capacity is some fixed amount that varies from person toperson. It is used to solve problems and reason. If part of the working memory is occupied byanxiety, it is taking away from the fixed capacity that can be used to come up with a solution(Beilock, 2008). There is also neurological data that supports these findings (Young, Wu, &Menon, 2012).Attribution: How students attribute their failures and successes is also tightly linked to howstudents perform. A study looked at twelve factors to which most influenced success in acomputer programming course (B. C. Wilson & Shrock
Conference Session
Computing Research I
Collection
2019 ASEE Annual Conference & Exposition
Authors
Chafic Bousaba, Guilford College
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
MB LPDDR2 (shared with video) 1, 2, or 4 MB LPDDR3 (shared with video) Ethernet Ports 10/100 fast ethernet 10/100/100 gigabit ethernet Wireless 2.4 GHz 802.11n, Bluetooth 4.0 n/a USB Ports 4 USB 2.0, 1 USB micro B (for power) 2 USB 2.0 A, 1 USB 3.0 Storage MicroSD (though can boot from USB MicroSD, eMMC Medium flash drive or external hard drive with a change in boot configuration) Power Supply 5V, 2.5 A max (micro USB B) 5V, 3A max (3.5 mm Barrel Connector)Software and
Conference Session
Computing and Information Technology Division Technical Session 2
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Tamer Omar, California State Polytechnic University, Pomona; Abdelfattah Amamra, California State Polytechnic University, Pomona; Kristina Rigden, California State Polytechnic University, Pomona; Thomas Ketseoglou, California State Polytechnic University, Pomona
Tagged Divisions
Computing and Information Technology
demand area ofcybersecurity applications. It will offer collaboration among three colleges (CoE, CoS, CBA) toleverage from delivered student knowledge transfer and deliver an effective, two-semester projectbased course.CLASS OBJECTIVES & RESEARCH QUESTIONSThe class objectives are summarized into four folds: 1. Student engagement in interdisciplinary work of frontier technologies and its cybersecurity related aspects. a. Build interdisciplinary teams comprising of three to six students from the Computer Science (CS), Electrical and Computer Engineering (ECE), and Computer Information Systems (CIS) departments to get involved in projects studying frontier technologies and their cybersecurity aspects. b
Conference Session
Cyber Technology
Collection
2019 ASEE Annual Conference & Exposition
Authors
Debra M. Duke, Virginia Commonwealth University; Mandayam Thirunarayanan, Florida International University; Abigail Byram, Virginia Commonwealth University; Peter J. Clarke, Florida International University
Tagged Divisions
Computing and Information Technology
Technical Symposium on Computing Science Education, New York, NY USA, 2016.[3] C. Watson and F. W. B. Li, "Failure rates in introductory programming revisited," in Proceedings of the 2014 conference on Innovation & technology in computer science education, New York, NY USA, 2014.[4] T. Beaubouef and J. Mason, "Why the high attrition rate for computer science students: some thoughts and observations," ACM SIGCSE Bulletin, vol. 37, no. 2, pp. 103-106, June 2005.[5] D. Teague and P. Roe, "Collaborative Learning – Towards A Solution for Novice Programmers," in Proceedings of the Tenth Australasian Computing Education Conference, Wollongong, Australia, January, 2008.[6] P. Fotaris, T. Mastoras, R. Leinfellner and Y
Conference Session
Topics in Computing and Information Technology-I
Collection
2018 ASEE Annual Conference & Exposition
Authors
Justin Daniel Josey, Robert Morris University; Sushil Acharya, Robert Morris University
Tagged Divisions
Computing and Information Technology
. Utilizing facial landmarks could increasethe size of a training dataset enough to take advantage of the power of a CNN.References[1]. Elfenbein, H. A., & Ambady, N. (2002b). Predicting workplace outcomes from the ability to eavesdrop on feelings. Journal of Applied Psychology, 87(5), 963-971.[2]. Galati, D., Miceli, R., & Sini, B. (2001). Judging and coding facial expression of emotions in congenitally blind children. International Journal of Behavioral Development, 25(3), 268-278.[3]. Darwin, C. (2005). The expression of emotion in man and animals. New York, NY: Appelton. (Original work published 1872)[4]. Ekman, P. & Friesen, W. (1977). Facial Action Coding System. New Jersey: Lawrence Erlbaum Association[5
Conference Session
Computing and Information Technology Division Technical Session 8
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Weidong Kuang, University of Texas Rio Grande Valley; Abhijit Baul, University of Texas Rio Grande Valley
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
). The resized image is either saved for database, or processed by a real timeface recognition system, which will be discussed in the following sections. The basics of facedetection using Haar Cascades can be found at [8]. Fig.2 shows the web camera screen with adetected face frame and saved face image (96x96 pixels). (a) (b) Fig.2 Fact detection: (a) video screen with a green rectangle identifying a detected face; (b) cropped face image for database or face recognition.2.3 Face Recognition After the face detection, we can assume that the images either for database or for recognitionare face-concentrated and resized to 96x96 pixels (e.g. Fig.2
Conference Session
Computing and Information Technology Division Poster Session
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Cheryl Lynn Resch, University of Florida; Christina Gardner McCune, University of Florida ; Amanpreet Kapoor, University of Florida
Tagged Divisions
Computing and Information Technology
received his M.S. in Computer Science from the University of Florida in 2016 and a B. Tech. in Computer Science & Engineering from Jaypee University of Engineering and Technology, India in 2015. American c Society for Engineering Education, 2021 Reflection and Transformational Learning in a Data Structures and Algorithms ClassAbstractReflective practice is the process of using one’s beliefs and prior experiences to analyze a problem;it is making meaning from experience. The process starts with noticing and naming the problem,continues to analyzing the problem, and finishes with forming new beliefs in order to solve theproblem. Reflective
Conference Session
Topics in Computing and Information Technology-III
Collection
2018 ASEE Annual Conference & Exposition
Authors
Landon A. Braden; Scott Alexander Kaiser, Utah Valley University; Reza Kamali-Sarvestani, Utah Valley University; Afsaneh Minaie, Utah Valley University; Paul Weber, Utah Valley University
Tagged Divisions
Computing and Information Technology
microfabrication and nanotechnology. Boca Raton, FL: CRC Press, 2012. 10. B. Robertson, “Science 101: How Does an Electron Microscope Work?,” Science and Children, vol. 051, no. 01, pp. 76–78, 2013. 11. B. Smith, “The Differences Between Atomic Force Microscopy and Scanning Electron Microscopy,” AZoM.com, 01-Aug-2017. [Online]. Available: https://www.azom.com/article.aspx?ArticleID=11879. [Accessed: 01-Feb-2018]. 12. “Scanning Electron Microscopy (SEM),” Techniques, 26-May-2017. [Online]. Available: https://serc.carleton.edu/research_education/geochemsheets/techniques/SEM.html. [Accessed: 02-Feb-2018]. 13. G. Brake, “Buying a Pre-Owned SEM,” Lab Manager. [Online]. Available: http://www.labmanager.com
Conference Session
Computing and Information Technology Division Technical Session 7
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Reza Sanati-Mehrizy, Utah Valley University; Afsaneh Minaie, Utah Valley University
Tagged Divisions
Computing and Information Technology
bit challenging but they really enjoy doing this kind of work.References: 1. J. A. Hoffer, M. B. Prescott and F. R. McFadden, “Modern Database Management”, Seventh Edition, Prentice Hall, 2005. 2. A. Perkins, “Business Rules = Meta Data”, the proceedings of the: Technology of Object-Oriented Languages and Systems, IEEE, 2000. 3. Catherine M. Ricardo, “Database Illuminated”, Third Edition, Jones & Bartlett Learning, 2017. 4. Mullins C. S. 1995, “The procedural DBA.” Database Programming & Design 812 (December): 40-45. 5. Rennhackkamp, M 1996, “Trigger Happy.” DBMS9,5 (May): 89-91, 95. 6. “Using Triggers and Compound Triggers in Oracle 11g”, https://dbanotes.com/using-triggers-and-compound
Conference Session
Computing Technology Applications-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Tamer Omar, California State Polytechnic University, Pomona; Srikanth Venkatesan, California State Polytechnic University, Pomona; Abdelfattah Amamra, California State Polytechnic University, Pomona
Tagged Divisions
Computing and Information Technology
program.The authors are planning to extend this study in future work to include more universities especiallythose interested in offering interdisciplinary programs and study the technical content of thecybersecurity-related courses offered by their respective departments.6. References[1] Juniper Research©, "Cybercrime will Cost Businesses Over $2 Trillion by 2019," 2015. [Online]. Available: https://www.juniperresearch.com/press/press-releases/cybercrime- cost-businesses-over-2trillion.[2] SANS ICS, "Analysis of the Cyber Attack on the Ukrainian Power Grid: Defense Use Case," 2016. [Online]. Available: https://ics.sans.org/media/E- ISAC_SANS_Ukraine_DUC_5.pdf.[3] J. B.-S. H. R. R. a. U. Lee, "Anatomy of the Information Security Workforce
Conference Session
Curriculum and Assessment I
Collection
2019 ASEE Annual Conference & Exposition
Authors
Karen C. Davis, Miami University
Tagged Divisions
Computing and Information Technology
design in a step-by-step fashion. An excerpt of the guided study is shown inFigure 5. The remainder of the guided study includes additional practice problems. Figure 5. A Guided Study Application and Creation QuestionOther topics covered in guided studies were: models and architectures, reverse engineering,functional dependencies, normal forms, normalization, physical database design, and B+trees.4. Evaluation of ImpactThe impact of adding guided studies to a flipped course can be gauged in a few different ways:completion rate (Zingaro et al. 2013, Garcia 2018) and student satisfaction (Maher et al. 2013)are two metrics that have been used in previous studies. Completion rates for all 10 guidedstudies were nearly 100% for the
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Jeong Yang, Texas A&M University-San Antonio; Brandon Earwood, Texas A&M University-San Antonio; Young Rae Kim, Texas A&M University-San Antonio; Akhtar Lodgher, Texas A&M University - San Antonio
Tagged Divisions
Computing and Information Technology
objectives are to keep themodules complete and independent so that they can be easily integrated into the courses. Eachmodule package consists of instructions, lab exercises and solutions, and assessment methods.The modules were also designed to incorporate the National Initiative for CybersecurityEducation (NICE) Cybersecurity Workforce Framework (NCWF) topics of Cyber Threat andVulnerabilities, Risk Management and Software Reverse Engineering [9].The purpose of this paper is a) to describe a set of six security modules that was implemented ina Computer Science 1 course during the fall semester of 2019 at Texas A&M University-SanAntonio and b) to report the results of evaluating teaching effectiveness of implementing thesecurity modules with
Conference Session
Computing and Information Technology Division Technical Session 6
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Zhaohong Wang, California State University, Chico; Jing Guo, California State University, Chico
Tagged Divisions
Computing and Information Technology
review,” Electronics, vol. 9, no. 2, p. 272, 2020.[15] M. Prakash and A. Abdrabou, “On the fidelity of ns-3 simulations of wireless multipath tcp connections,” Sensors, vol. 20, no. 24, p. 7289, 2020.[16] N. Kuse and B. Jaeger, “Network simulation with ns-3,” Network, vol. 67, 2020.[17] N. Jovanovi´c and A. Zaki´c, “Network simulation tools and spectral graph theory in teaching computer network,” Computer Applications in Engineering Education, vol. 26, no. 6, pp. 2084–2091, 2018.[18] Q. Gu, Y. Zhang, and H. Yang, “Application of “computer network teaching platform+ flipped teaching model” in online education-taking “information technology teaching method” as an example,” in International Conference on Machine Learning and Big
Conference Session
Curriculum and Assessment I
Collection
2019 ASEE Annual Conference & Exposition
Authors
Asuman Cagla Acun Sener, University of Louisville; Jeffrey Lloyd Hieb, University of Louisville; Olfa Nasraoui , University of Louisville
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
'15 Proceedings of the 46th ACM Technical Symposium on Computer ScienceEducation, Kansas City, 2015.[9] Sahin A., Cavlazoglu, B., & Zeytuncu, Y. E. (2015). Flipping a College Calculus Course: ACase Study. Educational Technology & Society, 18 (3), 142–152.[10] Khribi, M. K., Jemni, M., & Nasraoui, O. (2008, July). Automatic recommendations for e-learning personalization based on web usage mining techniques and information retrieval. InAdvanced Learning Technologies, 2008. ICALT'08. Eighth IEEE International Conference on(pp. 241-245). IEEE.[11] Khribi, M. K., Jemni, M., & Nasraoui, O. (2015). Recommendation systems forpersonalized technology-enhanced learning. In Ubiquitous learning environments andtechnologies (pp. 159-180
Conference Session
Computing and Information Technology Division Technical Session 9
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Wendi M. Kappers, Embry-Riddle Aeronautical University, Daytona Beach; Martha Nanette Harrell, Arkansas Tech University
Tagged Divisions
Computing and Information Technology
late IT project or one thatgoes above the projected budgeted amount can be very detrimental to the organization’s success.Whereas, the duties of the CRO differ slightly as they are typically responsible for many of thesame duties as the CIO in terms of understanding the corporate landscape and ongoing securityprojects. However, their field of expertise is more of governance. As data and devices converge,the role of the CRO and their management responsibilities seem to vary across the landscapewithin the given literature. Nevertheless, the CRO has become a mainstay within the executiveleadership team, and according to Karanja and Rosso [6], the CRO provides a voice within threemanagerial roles: (a) interpersonal, (b) informational, and (c
Conference Session
Topics in Computing and Information Technology-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Andreas Febrian, Utah State University; Oenardi Lawanto, Utah State University; Kamyn Peterson-Rucker; Alia Melvin; Shane E. Guymon
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
number of images increased rapidly. (a) An image example of the first problem (b) A puzzle example for the second problemFigure 1. Problem examples. The second problem contains two bridge-puzzles, one easy and the other of mediumdifficulty; please see Figure 1 (b) for example. The puzzle rules are (a) to connect each island,which is represented as a circle, with the number of bridges shown inside the circle; (b) there canonly be two bridges connecting two islands; (c) a bridge must not overlap with other bridges orislands; and (d) there must be continuous link between all islands, which means there cannot beisolated island. Figure 1 (b) presents a solution that satisfies the puzzle’s rules. When solving the second problem, the
Conference Session
Topics in Computing and Information Technology-III
Collection
2018 ASEE Annual Conference & Exposition
Authors
Mehmet Ergezer, Wentworth Institute of Technology; Bryon Kucharski, Wentworth Institute of Technology; Aaron Carpenter, Wentworth Institute of Technology
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Cognitive Psychology, vol. 19, no. 4-5, pp. 494–513, 2007. [5] S. Freeman, E. O’Connor, J. W. Parks, M. Cunningham, D. Hurley, D. Haak, C. Dirks, and M. P. Wenderoth, “Prescribed active learning increases performance in introductory biology,” CBE-Life Sciences Education, vol. 6, no. 2, pp. 132–139, 2007. [6] S. Freeman, D. Haak, and M. P. Wenderoth, “Increased course structure improves performance in introductory biology,” CBE-Life Sciences Education, vol. 10, no. 2, pp. 175–186, 2011. [7] R. Heradio, L. de la Torre, D. Galan, F. J. Cabrerizo, E. Herrera-Viedma, and S. Dormido, “Virtual and remote labs in education: A bibliometric analysis,” Computers & Education, vol. 98, pp. 14–38, 2016. [8] M. Ergezer, B. Kucharski, and A
Conference Session
Computing and Information Technology Division Poster Session
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Erica Haugtvedt, South Dakota School of Mines and Technology; Duane L. Abata, South Dakota School of Mines and Technology
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
,” Journal of EngineeringEducation, vol. 100, no. 1, January 2011.[3] K. Beddoes and M. Borrego, “Feminist Theory in Three Engineering Education Journals:1995-2008,” Journal of Engineering Education, vol. 100, no. 2, April 2011.[4] L. R. Lattuca, D. B. Knight, H. Kyoung Ro, B. Novoselich. “Supporting the Development ofEngineers’ Interdisciplinary Competence.” Journal of Engineering Education, vol. 106, no. 1,January 2017.[5] M.A. Boden, M. A. Mind as machine: A history of cognitive science. Oxford University Press,2006.[6] M. Moack, “Difference Engine Leaves Computer History Museum,” Mountain View Voice,January 28, 2016[7] J. J. O’Connor, E. F. Robertson, "Luigi Federico Menabrea," MacTutor History ofMathematics archive, University of St Andrews
Conference Session
Computing and Information Technology Division Technical Session 5
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Jared Oluoch, University of Toledo
Tagged Divisions
Computing and Information Technology
outcome.Faculty also provide a table for each course that shows a summary of the raw data for the directevidence that each assessment instrument generates. Let’s take CSET 4100 Server-SideProgramming as an example. An assessment on the need for continuous improvement couldinclude: a) Questions in two homework assignments involving Java web application anddeployment to reveal mastery of CAC and ETAC outcome 4; b) Two programming assignmentsinvolving Java server-side scripting designed to reveal mastery of CAC and ETAC outcome1. Figure 1: University of Toledo CSET Curriculum Computer Science & Engineering Technology Curriculum - Full Time (Effective Fall 2013