of the 49th ACM Technical Symposium on Computer Science Education (SIGCSE ’18). ACM, New York, NY, USA, 876–881. https://doi.org/10.1145/3159450.3159508 [2] C.T. Amelink, K. Davis, B.G. Ryder, and M.O. Ellis. 2018. Exploring Factors Influencing the Continued Interest in a Computer Science Major. In 2018 ASEE Annual Conference & Exposition. ASEE, Washington,D.C., 16. [3] Auth0. 2019. DB Browser for SQLite. https://sqlitebrowser.org/. [4] balsamiq. 2019. balsamiq. https://balsamiq.com/learn/. [5] Thomas C. Bressoud and Gavin Thomas. 2019. A Novel Course in Data Systems with Minimal Prerequisites. In Proceedings of the 50th ACM Technical Symposium on Computer Science Education (SIGCSE ’19). ACM, New York, NY, USA, 15
is an ASEE, INFORMS, and IEEE member. He is currently an Associate Editor of The 2019 IEEE/RSJ International Conference on Intelligent Robots and Systems (IEEE-IROS 2019) . c American Society for Engineering Education, 2019 An Integrated Learning Approach Used in Computer Architecture Chaomin Luo, Ph.D. Department of Electrical and Computer Engineering Mississippi State University Mississippi State, MS 39762, USA email: Chaomin.Luo@ece.msstate.eduAbstractStudent-centered learning has been discovered as the most effective pedagogy for teaching
$400K to ransomware hackers, 2019. Retrieved from: https://statescoop.com/georgia-county-paid-400k-to-ransomware-hackers/3. D. Kobialka, Regis University Cyberattack: What You Need to Know, 2019. Retrieved from: https://www.msspalert.com/cybersecurity-breaches-and-attacks/regis-university-cyberattack-what-you-need-to- know/4. Symantec, 10 cybersecurity facts and statistics for 2018, 2018. Retrieved from: https://us.norton.com/internetsecurity-emerging-threats-10-facts-about-todays-cybersecurity-landscape-that- you-should-know.html5. T. S. Chou, “Multi-Learning Techniques for Enhancing Student Engagement in Cyber Security Education,” American Society for Engineering Education (ASEE) Annual Conference and
Paper ID #25133Design and Development of Cybersecurity Concentration Courses and Labo-ratory Experiences for Undergraduate StudentsDr. Nikunja Swain P.E., South Carolina State University Dr. Swain is currently a Professor at the South Carolina State University. Dr. Swain has 30+ years of experience as an engineer and educator. He has more than 60 publications in journals and conference proceedings, has procured research and development grants from the NSF, NASA, DOT, DOD, and DOE and reviewed a number of books on computer-related areas. He is also a reviewer for ACM Computing Reviews, IJAMT, CIT, ASEE, and other conferences
. This exposed our students tocollaborators among different fields, with their own terminology, goals, work methods andpractical approaches. Our paper reports on the initial experiment during the Fall 2019 term,involving two sections of an Artificial Intelligence class and one section of a Deep Learningclass. We are planning to continue this collaboration in the future.Keywords: Collaborative Learning, Interdisciplinary, Inter-Class teamwork 1. IntroductionStudents at California Polytechnic State University, San Luis Obispo (Cal Poly) are exposed topractical, hands-on educational activities throughout their course of studies, reflected by theuniversity’s “Learn by Doing” motto. In the Computer Science, Software Engineering andComputer
andmultiple virtual machines (VMs) were nested in each environment to serve both tasks of attackand defense. A graphic user interface (GUI) application was designed to provide access to theenvironment where cybersecurity activities were performed. The application menu included a setof CyberSec labs, each containing a pair of attack and defense sub-labs. Each sub-lab is acombination of both cybersecurity theory and practice.A workshop was held in the summer 2019 in the Department of Technology Systems (TSYS) atEast Carolina University (ECU) in the summer of 2019. Nineteen college instructors wereinvited to use the system and participated in a survey in the end of the workshop. In this paper,we discussed the survey results of both the learning
Ph.D.in Educational Research and Policy Analysis from NC State University in 1996. She also has an MBA from Indiana University (Bloomington) and a bachelor’s degree from Duke University. She specializes in eval- uation and research in engineering education, computer science education, and technology education. Dr. Brawner is a founding member and former treasurer of Research Triangle Park Evaluators, an Ameri- can Evaluation Association affiliate organization and is a member of the American Educational Research Association and American Evaluation Association, in addition to ASEE. Dr. Brawner is also an Exten- sion Services Consultant for the National Center for Women in Information Technology (NCWIT) and, in that
Recruitment Tools” in 2019 CoNECD - The Collaborative Network for Engineering and Computing Diversity , Crystal City, Virginia. https://peer.asee.org/31798[7] V. White, S. Lee, L. Lineberry, J. Ivy, C. Grimes, “Illuminating the Computing Pathway for Women in Mississippi”, in 2018 ASEE Annual Conference & Exposition , Salt Lake City, Utah. 10.18260/1-2--30596[8] K. Davis, S. Hardin, “Making STEM Fun: How to Organize a STEM Camp”, Teaching Exceptional Children, Vol. 45, No. 4, pp. 60-76, 2013.[9] http://www.alice.org/[10] https://cyber.org/[11] National Association of Colleges and Employers; “Career Readiness Defined”, https://www.naceweb.org/career-readiness/competencies/career-readiness-defined/[12] http
was conducted to identify the best search strings and databases for our goal[38]. After refining the list, the final search was conducted in March and April of 2020. Allqueries were conducted using the Google Scholar database, the Institute of Electrical andElectronics Engineers (IEEE) Xplore Digital Library, the Association for Computing Machinery(ACM) Digital Library, and conference proceedings from the American Society for EngineeringEducation (ASEE). We used the following search strings: computing interview, computing hiring,computing occupations, computing jobs, technical interviews, technical hiring, technicaloccupations, technical jobs, software engineer* interviews, software engineer* hiring, softwareengineer* occupations, software
AnIndustry Crisis", stating 3.5 M jobs world-wide will not be filled by 2021 [10]. A recentworkforce study published in 2019 by (ICS)2, [11] the world’s largest non-profit association thatcertifies cybersecurity professionals, reported that in order to meet the needs of cybersecurityworkforce globally, skilled cybersecurity professionals needs to grow by 145% to meet thedemand. The report further stated that in order to meet the crucial needs of American businesses,the US cybersecurity workforce needs to grow by 62%!The module was embedded in a junior level computer science class required to be taken by allcomputer science and electrical engineering students. The course introduces Unix commands andtools for software development and testing. Students
trips. If networkintrusion attacks succeed to compromise IoV systems, intruders will control the autonomous vehiclescommunicating with the infrastructure, and this may lead to serious fatal consequences. Therefore,using an IDS to protect the IoV system is very crucial. In this project, students will use traditional IDSto protect the IoV system.REFERENCES[1] Cisco, "Cisco Visual Networking Index: Forecast and Trends, 2017–2022 White Paper," 2019.[2] IBM, "The demand for cybersecurity professionals is outstripping the supply of skilled workers," 2019.[3] T. Omar, S. Venkatesan and A. Amamra, "Development of Undergraduate Interdisciplinary Cybersecurity Program: A Literature Survey," in ASEE Annual Conference & Exposition, Salt
Paper ID #26981Science and Engineering Courses, Theory and Practice; An ExampleDr. S. ”Hossein” Mousavinezhad P.E., Idaho State University Dr. Mousavinezhad was the principal investigator of the National Science Foundation’s research grant, National Wireless Research Collaboration Symposium 2014; he has published a book (with Dr. Hu of University of North Dakota) on mobile computing in 2013. Professor Mousavinezhad is an active mem- ber of IEEE and ASEE having chaired sessions in national and regional conferences. He has been an ABET Program Evaluator for Electrical Engineering and Computer Engineering as well as
Dakota State University and PhD from the University of Missouri-Columbia, all in electrical engineering. Dur- ing 2001-2016 he was the Dean of the College of Engineering and Computer Science at California State University, Fullerton. Prior to that he was the Head of the Electrical Engineering Department at RIT in Rochester, NY. Fullerton Chamber of Commerce recognized him in 2015 as the ”Educator of the Year.” In 2016 he received ASEE’s ”Distinguished Educator Award” from the ECE Division. Dr. Unnikrishnan was a member of the Accreditation Committee for American Society of Engineering Education (ASEE). He was a Commissioner of the Engineering Accreditation Commission of ABET during 2008-13 and chaired the
level compared to the other twocategories. Such results can help university policymakers in the early identification of morevulnerable students and providing them with financial and academic supports to boost theirengagement with the university.References [1] Doug Shapiro, Afet Dundar, Faye Huie, Phoebe Khasiala Wakhungu, Ayesha Bhimdiwala, and Sean Eric Wilson. Completing college: A national view of student completion rates–fall 2012 cohort (signature report no. 16). National Student Clearinghouse, 2018. [2] Leila Zahedi, Stephanie J Lunn, S Pouyanfar, MS Ross, and MW Ohland. Leveraging machine learning techniques to analyze computing persistence in undergraduate programs. In 2020 ASEE Virtual Annual Conference Content Access
their availability to prepare, including non-computing related jobs, caring for a familymember, or ongoing health issues. While we do consider the support mechanisms students mayleverage to overcome obstacles, in general, these results emphasize the larger issues in existinghiring structures, and demonstrate the importance of not treating students as a monolith. Thefindings from this work are intended to inform educators about how to better prepare students tosucceed on technical interviews, and to encourage industry to reform the process to make it moreequitable.1 IntroductionBetween 2019 and 2029, demand for workers in computing occupations are expected to surge28.8% [1]. For specific positions the projected rate is even higher, with 35.0
and industry-sponsored competitions.Georgia Institute of Technology pairs this continuous learning with a formalized capstone designcourse to further promote experiential opportunities for its students. The student-run Design &Innovation development team embodies extracurricular experiential learning by designing anddeveloping bespoke software solutions to support Georgia Tech’s Interdisciplinary CapstoneDesign (IDCD) program. In 2013, the original team designed these solutions using Django, aPython-based web framework, and Ruby-on-Rails, a web framework written in Ruby. Atransition to the Infinite Blue Platform, a low-code application development platform, was madein 2019 to ensure application sustainability. This transition highlights
publications regarding to the research and educational projects. American c Society for Engineering Education, 2021 2021 ASEE Annual Conference UML Based Design of Employee Information Management System Michael Porter, Phil Bording, and Yujian Fu Alabama A&M UniversityAbstractThis student project developed a Vendor and Employee Management System (VEMS) thatorganizes employees and vendor information using UML model based on object-orientedsoftware development methodology. A good employee and vendor database system is a criticalpiece of software for a business of any size. It is
, Physics, Differential Equations, Linear Algebra. Programming andDiscrete Mathematics classes offered by the Department of Computer Science were the mostused classes within the School. Access to classes within the School was allowed usually at alater date than the start of registration so as to allow declared majors to make good progresstowards graduation. Issues that arose included classed closing while demand from continuingmajors was still not taken care of; for example, students that failed a class in the major and didnot plan ahead.In the 2019 catalog the policy became stricter with concerns over low graduation ratesbecoming an important factor. • Applicant has completed 24 or more semester credit hours at the university and
universities and companies.Dr. Rajendran Swamidurai, Alabama State University Dr. Rajendran Swamidurai is an Professor of Computer Science at Alabama State University. He received his BE in 1992 and ME in 1998 from the University of Madras, and PhD in Computer Science and Software Engineering from Auburn University in 2009. He is an IEEE senior Member and ASEE Member. American c Society for Engineering Education, 2021Integrating Cybersecurity Concepts Across Undergraduate Computer Science andInformation System CurriculumAbstractThe global Cybersecurity skill gap in 2020 is about 3.1 million and the Cybersecurity staffshortage is about 69%. Universities are waking up to
-achieving underserved computing students on the basis of gender, field, and year in school,” in 2018 CoNECD - The Collaborative Network for Engineering and Computing Diversity Conference. Crystal City, Virginia: ASEE Conferences, April 2018, https://peer.asee.org/29535.[16] “NSF scholarships in science, technology, engineering, and mathematics program (S-STEM),” https://www.nsf.gov/funding/pgm summ.jsp?pims id=5257, accessed: 2020-11-16.[17] K. Spiel, O. L. Haimson, and D. Lottridge, “How to do better with gender on surveys: A guide for HCI researchers,” Interactions, vol. 26, no. 4, p. 62–65, Jun. 2019. [Online]. Available: https://doi.org/10.1145/3338283[18] J. Mahadeo, Z. Hazari, and G. Potvin, “Developing a computing
. His general expertise and interests include: IoT and Network Technologies, iOS application development, and Secure programming. He has recently published his first ASEE paper and presented at the ASEE NCS Section in March 2019 with his senior capstone team, SoT (Secure of Things). c American Society for Engineering Education, 2019 Pedagogical Assessment of Secure Coding in Student ProgramsAbstractStudents in introductory Computer Science (CS) courses are required to submit severalprogramming assignments and/or projects. The submitted programs are largely assessed on theircorrectness to the given problem, and not against secure software coding practices. In ourexperience, student programs
, Communication and Electronics (ETCCE). IEEE, 2020, pp. 1–6. [4] G. Sasi, P. Thanapal, V. Balaji, G. V. Babu, and V. Elamaran, “A handy approach for teaching and learning computer networks using wireshark,” in 2020 Fourth International Conference on Inventive Systems and Control (ICISC). IEEE, 2020, pp. 456–461. [5] M. Kuzlu and O. Popescu, “Upgrading of a data communication and computer networks course in engineering technology program,” in ASEE Annual Conference, 2020. [6] M. Prvan and J. OˇzEGOVI´c, “Methods in teaching computer networks: a literature review,” ACM Transactions on Computing Education (TOCE), vol. 20, no. 3, pp. 1–35, 2020. [7] J. Chandrasekaran, D. Anitha et al., “Enhancing student learning and engagement in the
students live at home or in off-campus housing, which often makes itdifficult for them to participate in co-curricular and extracurricular activities. Many students donot have time to spend much time outside of class on campus, leading some to feel littleconnection with other students. About 80% of UVU’s students will remain in their communitiesand pursue employment in this region [2].One of the hallmarks of the institution in the past three decades has been its rapid growth andtransformation in response to the tremendous demographic and economic changes in the serviceregion. Utah County has been one of the fastest growing regions in the country with itspopulation increasing from 263,590 in 1990 to 663,590 in 2019[3]. New minority populations(18
Progress in Engineering Education. Conference Proceedings (IEEE Cat. No.00CH37135), Oct. 2000, vol. 2, p. S1A/14-S1A/19 vol.2. doi: 10.1109/FIE.2000.896606.[20] H. Shafeek, “Applying Lean Concepts in the Quality Control Systems of Engineering Education — A Case Study,” in 2019 Industrial Systems Engineering Conference (ISEC), Jan. 2019, pp. 1–9. doi: 10.1109/IASEC.2019.8686676.[21] Y. Kalaani and R. Haddad, “Continuous Improvement in the Assessment Process of Engineering Programs,” Proc. 2014 Am. Soc. Eng. Educ. Southeast Sect. Conf., p. 11, Mar. 2014.[22] J. M. Juran, A. B. Godfrey, R. Hoogstoel, and E. Schilling, Eds., Juran’s quality handbook, 5th ed. New York: McGraw Hill, 1999.[23] A. Camacho and Y. Ruiz, “Facing the
Science Course. Paper presented at the ASEE IL-IN Section Conference, Evansville, IN. https://docs.lib.purdue.edu/aseeil- insectionconference/2019/curriculum/4/Steele, C. M. (2011). Whistling Vivaldi: How stereotypes affect us and what we can do: WW Norton & Company.Tobias, S. (1993). Overcoming math anxiety: WW Norton & Company.Van Overwalle, F. (1989). Structure of freshmen's causal attributions for exam performance. Journal of Educational Psychology, 81(3), 400.Walton, G. M., & Brady, S. T. (2017). The Many Questions of Belonging. Handbook of Competence and Motivation: Theory and Application, 272.Walton, G. M., & Cohen, G. L. (2011). A brief social-belonging intervention improves academic and
teaching methods has been supported by the National Science Foundation and the Sloan Foundation and his team received for the best paper published in the Journal of Engineering Education in 2008, 2011, and 2019 and from the IEEE Transactions on Education in 2011 and 2015. Dr. Ohland is an ABET Program Evaluator for ASEE. He was the 2002–2006 President of Tau Beta Pi and is a Fellow of the ASEE, IEEE, and AAAS. c American Society for Engineering Education, 2020 Leveraging machine learning techniques to analyze persistence in undergraduate computing programsAbstractAlthough student retention remains a significant concern for all Science, Technology,Engineering, and Mathematics
Services (FIS), and Turkish Airlines. He is a se- nior member of the Association for Computing Machinery (ACM), and a senior member of Institute for Electrical and Electronics Engineers (IEEE); and a member of Engineers Without Borders International (EWB-I), American Society for Engineering Education (ASEE), and Association for Information Systems (AIS).Dr. Kevin N. Bowlyn, Sacred Heart University Kevin N. Bowlyn is an Assistant Professor at Sacred Heart University. His current research interest is focused on a more efficient method for computing a fast Fourier transform (FFT) algorithm. His re- search interests are in digital hardware design, digital signal processing, low area-power circuit designs, embedded
introductory programming,” SIGCSE Bull., vol. 39, no. 2, p. 32–36, Jun. 2007. [Online]. Available: https: //doi.org/10.1145/1272848.1272879 [2] C. Watson and F. W. Li, “Failure rates in introductory programming revisited,” in Proceedings of the 2014 Conference on Innovation & Technology in Computer Science Education, ser. ITiCSE ’14. New York, NY, USA: Association for Computing Machinery, 2014, p. 39–44. [Online]. Available: https://doi.org/10.1145/2591708.2591749 [3] J. Bishop and M. A. Verleger, “The flipped classroom: A survey of the research,” in 2013 ASEE Annual Conference & Exposition, no. 9. Atlanta, Georgia: ASEE Conferences, June 2013, pp. 1–18. [Online]. Available: https://peer.asee.org/22585
module emphasizing encryption and decryption used as the semesterproject for the course. Each module is a collection of concepts related to cyber security. Theindividual cyber security concepts are presented with a general description of a security issue toavoid, sample code with the security issue written in the Java programming language, and asecond version of the code with an effective solution. The set of these modules was implementedin Computer Science I during the Fall 2019 semester. Incorporating each of the concepts in thesemodules into lectures depends on both the topic covered and the approach to resolving therelated security issue.Students were introduced to computing concepts related to both the security issue and theappropriate
University in 1996 and Ph.D. in Computer Science from Clemson University in 2003. His research interests are in the areas of software testing, software metrics, model-driven software development, domain-specific modeling languages, and computer science education. He is currently an associate professor in the School of Computing and In- formation Sciences at Florida International University. He is a member of the ACM (SIGSOFT, SIGCSE, and SIGAPP); IEEE Computer Society; and a member of the Association for Software Testing (AST). c American Society for Engineering Education, 2019 Students’ Perceptions of the Implementation of a Cyberlearning