Asee peer logo
Well-matched quotation marks can be used to demarcate phrases, and the + and - operators can be used to require or exclude words respectively
Displaying results 1 - 30 of 96 in total
Conference Session
Emerging Information Technologies
Collection
2007 Annual Conference & Exposition
Authors
Warith Al-Sulaimani, Modern College of Business and Science-Sultanate of Oman; P Mani Joseph, Modern College of Business and Science-Sultanate of Oman; Saeid Moslehpour, University of Hartford
Tagged Divisions
Information Systems
AC 2007-1360: A STUDY ON THE PERFORMANCE OF BLUETOOTH AND IEEE802.11B COEXISTENCEWarith Al-Sulaimani, Modern College of Business and Science-Sultanate of Oman Warith Al-Sulaimani is a Lecturer and Consultant at the Modern College of Business and Science, Oman. Warith earned a Bachelor’s Degree in Electronic & Electrical Engineering from the University of Strathclyde (UK), a Diploma in Computers and Information Systems from Sultan Qaboos University (Oman) and Master’s Degree in Advanced Computer networking from Glasgow Caledonian University (UK). His primary research focus is in the areas of Wireless Networking, Internet Technologies and Network Security. He holds certifications in A
Conference Session
Laboratory and Internship Innovations in IT/IS
Collection
2007 Annual Conference & Exposition
Authors
Xiaoxi Martin, Western Carolina University; Brant Price, Western Carolina University; James Zhang, Western Carolina University; Duane Dunlap, Western Carolina University; Robert Adams, Western Carolina University
Tagged Divisions
Information Systems
successful completion of the tests. Figure 2 shows the lab and test processflowcharts for the user interface. Upon successful login in Figure 5a, the student will be directedto the welcome page shown in Figure 5b. This stage includes an overview of the lab and recordsthe student’s information. Page 12.30.4 Proceedings of the 2007 American Society for Engineering Education Annual Conference & Exposition Copyright®2007, American Society for Engineering Education (a) (b) Figure 2. User Interface Flowcharts. (a) Lab flowchart, (b) Quiz flowchart
Conference Session
POTPOURRI
Collection
2010 Annual Conference & Exposition
Authors
Guy Johnson, Rochester Institute of Technology; Brian Tomaszewski, RIT
Tagged Divisions
Information Systems
, energy, oil and gas refining, and transportation systems to achieve increasing efficiencies in overall system operation. As geographically-aware sensors and mobile devices (such as GPS-enabled cell phones ) become more ubiquitous and allow the public to capture where (a) the location of events happen or (b) data is gathered, such actions have potential impacts on future actions, strategic decisions and proposed policies. In particular, mobile GTs open the door to methods of reasoning and persuasion that would be impossible without the use of publically available spatial information. For example, during a disaster, location-based videos captured through cell phones at a disaster site can facilitate rapid allocation of resources
Conference Session
Emerging Information Technologies
Collection
2010 Annual Conference & Exposition
Authors
J. Wey Chen, Southern Taiwan University
Tagged Divisions
Information Systems
way ensures that the system“knows” the dependencies between concepts, and uses this knowledge to provide customizedinstruction and feedback to errors.For our purposes, we identified a set of concepts that are taught in our Java programminglanguage course at the Southern Taiwan University. Each concept is represented by a node in thegraph. We add a directed line from one concept (node) to another, if knowledge of the former is aprerequisite for understanding the latter. Thus, the DAG can be constructed manually with the aidof the course textbook. For example, consider one instance of the if statement in Java such as: if((a <= b) && (b <= c)) return true
Conference Session
IT-based Instructional Technologies
Collection
2009 Annual Conference & Exposition
Authors
Peng Li, East Carolina University
Tagged Divisions
Information Systems
. Using Snort as a Packet Logger 1. In the SSH terminal, capture and log packets in binary format by typing /usr/local/bin/snort -b -L /home/student/BinCapture (Note: If the log file is not specified, Snort will create binary logs in /var/log/snort with the name snort.log.[timestamp].) 2. Wait no shorter than 10 seconds and press Ctrl-C to stop sniffing. 3. Check the names of the generated file by typing ls /home/student 4. The binary log file name looks like this: BinCapture.1160008555, in which 1160008555 is the timestamp. Your log file should have a different timestamp. 5. You can read the binary log file using Wireshark or Tcpdump. Type /usr/sbin/tcpdump -r BinCapture.[timestamp] 6. Record the last
Conference Session
Information and Network Security
Collection
2010 Annual Conference & Exposition
Authors
Xiangchun Cheng, Zhejiang University of Technology; Min Chen, Zhejiang University of Technology; Rong Gu, WWW.ZJUT.EDU.CN; Yingzhen Weng, Zhejiang University of Technology
Tagged Divisions
Information Systems
AC 2010-1206: A VIRTUAL ASSEMBLY SYSTEM ON AUTOMOBILE ENGINEFOR ASSEMBLY SKILLS TRAININGXiangchun Cheng, Zhejiang University of Technology College of Education, Zhejiang University of Technology, Hangzhou, Zhejiang, 310014, ChinaRong Gu, WWW.ZJUT.EDU.CN College of Education, Zhejiang University of Technology, Hangzhou, Zhejiang, 310014, ChinaMin Chen, Zhejiang University of TechnologyYingzhen Weng, Zhejiang University of Technology Page 15.110.1© American Society for Engineering Education, 2010 A Virtual Assembly System on Automobile Engine for Assembly Skills TrainingAbstractVirtual
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2007 Annual Conference & Exposition
Authors
Sohail Anwar, Pennsylvania State University-Altoona College; Jungwoo Ryoo, Pennsylvania State University-Altoona College; Harpal Dhillon, Excelsior College; David Barnes, Pennsylvania State University-Altoona College
Tagged Divisions
Information Systems
of its above mentioned efforts. However, such anassessment is planned for the near future.Bibliography1. Hentea, M., H. Dhillon, and M. Dhillon. “Towards Changes in Information Security Education.” Journal ofInformation Technology Education, Volume 5, 2006. Page 12.226.92. Dark, M., J. Ekstrom, and B. Lunt. “Integrating Information Assurance and Security into IT Education: A Lookat the Model Curriculum and Emerging Practice.” Journal of Information Technology Education, Volume 5, 2006.3. Logan, P. “Crafting an Undergraduate Information Security Emphasis Within Information Technology.” Journalof Information Systems Education, 13 (3)4
Conference Session
Security
Collection
2006 Annual Conference & Exposition
Authors
Mario Garcia, Texas A&M University-Corpus Christi
Tagged Divisions
Information Systems
Recognition, Article Published by HTG Systems.[3] Joyce, R. and G. Gupta, “Identity Authentication Based on keystroke Latencies,” Communications of ACM,Volume 33, Issue 2, ( February 1990). Retrieved on 8th March 2005.[4] Kung, S., Biometric Authentication: A Machine Learning Approach, First Edition , Published by Prentice Hall,PTR.[5] Obaidat, S. and B. Sadoun, Verification of Computer users using Keystroke Dynamics,” IEEE, Volume 27,Issue 2, (April 1997). Retrieved from IEEE on 16th February 2005.[6] Peacock, A., Learning User Keystroke Latency Patterns, acquired fromhttp://pel.cs.byu.edu/~alen/personal/CourseWork/cs572/KeystrokePaper/index.html [7] Umphress, D., and G. Williams, Identity Verification Through keyboard Characteristics
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2007 Annual Conference & Exposition
Authors
Mario Garcia, Texas A&M University-Corpus Christi
Tagged Divisions
Information Systems
withefficient time and resource investments specifically improving data selection, data preparation,data quality (from all the information sources), resulting in precision and reduction in theassociated computing costsBibliography1. Agarwal,R.,Imielinski,T.,and Swami,A. Mining Associations between Sets of Items in Massive Databases. In proceedings of the ACM-SIGMOD 1993 International Conference on Management of Data, pages 207-216.2. Allen ,J.,Christie,A.,Fithen,W.,McHugh,J.,Pickel,J.,and Stoner, E. State of the Practice of Intrusion Detection Technologies. Technical report, Carnegie Mellon University.3. Gurley B. R. Intrusion Detection. Macmillan Computer Publishing. (MCP), Indianopolis. 2000.4. Barbara D. and Jajodia S. Applications
Conference Session
DB & Information Integration
Collection
2006 Annual Conference & Exposition
Authors
Phillip Wilson, Texas A&M University-Corpus Christi; John Fernandez, Texas A&M University-Corpus Christi
Tagged Divisions
Information Systems
2006-1700: MEASURING USER SATISFACTION BY DETECTING ANDMEASURING EMOTIONSJohn Fernandez, Texas A&M University-Corpus Christi Dr. Fernandez is Assistant Professor of Computer Science in the Department of Computing and Mathematical Sciences. Having served 20 years in the U.S. Air Force and 10 years in private industry, Dr. Fernandez brings real-world experiences into the classroom for his students. His research interests are in HCI, information assurance, and software engineering.Phillip Wilson, Texas A&M University-Corpus Christi Mr. Phillip Wilson is a graduate assistant at Texas A&M University – Corpus Christi. He has a BS in Computer Science and Mathematics and is currently
Conference Session
IT-based Instructional Technologies
Collection
2009 Annual Conference & Exposition
Authors
Susan Miertschin, University of Houston; Cheryl Willis, University of Houston
Tagged Divisions
Information Systems
and how this technique may be useful for making complex learningenvironments more navigable. The author believes advances in technology are poised tomake huge differences in the way we teach and the way students learn. Future work willinclude implementation of such tools in courses taught and comparative assessment ofstudent learning outcomes.References1. Novak, J. D.; Cañas, A. J. The Theory Underlying Concept Maps and How to Construct Them. cmap.ihmc.us/Publications/ResearchPapers/TheoryUnderlyingConceptMaps.pdf (November 20, 2008),2. Novak, J. D.; Gowin, D. B., Learning how to learn. Cambridge University Press: Cambridge, 1984.3. Milam, J. H., Jr.; Santo, S. A.; Heaton, L. A. Concept maps for web-based
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2009 Annual Conference & Exposition
Authors
Thomas Hacker, Purdue University, West Lafayette; Krishna Madhavan, Purdue University
Tagged Divisions
Information Systems
. Fullyexploiting the power of these systems, however, is a significant challenge. We are developing ahigh performance computing and cyberinfrastructure signature area, and as part of this effort,working to develop a flexible world-class laboratory that can be used for both research andeducation. The goals of this effort are to: (a) educate a cohort of students from backgrounds incomputing and the domain sciences in the development, deployment, and use of highperformance computing and cyberinfrastructure systems; (b) establish a research facility tosupport discovery in high performance computing, cyberinfrastructure, and bioinformaticsamong a group of faculty and graduate students; and (c) seek new ways to effectively andefficiently share and leverage
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2009 Annual Conference & Exposition
Authors
Reza Sanati-Mehrizy, Utah Valley State College; Floyd Wilkes, Utah Valley University; Afsaneh Minaie, Utah Valley University
Tagged Divisions
Information Systems
# 1. 3. Print every table in a nice tabular form. 4. Write SQL queries to retrieve the same information that you did in project #1. 5. Print the English statement indicating the information that you are trying to retrieve. 6. Print each query and its result to show your DB works correctly. B. Object-Oriented Implementation: 1. Use DB4o to create the necessary classes for your database. 2. Use eclipse(optional) to create objects corresponding to the tuples that you entered in the Object-Relational model. 3. Print all the object of each extent in certain readable form. 4. Write queries to retrieve the same
Conference Session
Emerging Information Technologies
Collection
2009 Annual Conference & Exposition
Authors
Mudasser Wyne, National University, San Diego; Arzu Baloglu, Marmara University, Turkey
Tagged Divisions
Information Systems
Maybe 12 No 10 Yes 8 6 4 2 0 al b l ch Th ro ic U e ily R og a O T Fa h io ha D t ia ia he m rn yn N at ac ed ad eu m sy l ed pt ro E te P
Conference Session
POTPOURRI
Collection
2010 Annual Conference & Exposition
Authors
Reza Sanati-Mehrizy, Utah Valley University; Paymon Sanati-Mehrizy, University of Pennsylvania; Afsaneh Minaie, Utah Valley University; Chad Dean, Utah Valley University
Tagged Divisions
Information Systems
AC 2010-1357: HOW A DATA MINING COURSE SHOULD BE TAUGHT IN ANUNDERGRADUATE COMPUTER SCIENCE CURRICULUMReza Sanati-Mehrizy, Utah Valley UniversityPaymon Sanati-Mehrizy, University of PennsylvaniaAfsaneh Minaie, Utah Valley UniversityChad Dean, Utah Valley University Page 15.646.1© American Society for Engineering Education, 2010 How a Data Mining Course Should be Taught in an Undergraduate Computer Science CurriculumAbstractData mining is a relatively new area of computer science that brings the concept of artificialintelligence, data structures, statistics, and database together. It is a high demand area becausemany organizations and businesses can benefit
Conference Session
IT-based Instructional Technologies
Collection
2009 Annual Conference & Exposition
Authors
Tal Rusak, Cornell University; Christopher Barnes, Cornell University; G. Scott Russ, Cornell University; Vincent Kam, Cornell University; David Gries, Cornell University
Tagged Divisions
Information Systems
graduation only), and the ability to add free text notes to anyrequirements. In initial versions of this interface, users were confused about where to startbuilding the requirement, so we added a clear starting point as shown in Figure 3.Figure 4 shows the interface used by staff members utilizing the system to enter requirements intoeach requirements unit. Figure 4(a) is an individual course that is used for a requirement. Asshown, it is possible to optionally enter a requisite grade or number of credit hours required foreach course. If these options are not specified, then CPAS defaults to a global setting that can bespecified per university policy. In Figure 4(b), we see several courses separated by Booleanoperators. In Figure 4(c), we
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2010 Annual Conference & Exposition
Authors
Thomas Hacker, Purdue University, West Lafayette
Tagged Divisions
Information Systems
engineering. 2000: IEEE Computer Society Press; 1998.16. McKusick, M., et al., A fast file system for UNIX. ACM Transactions on Computer Systems (TOCS), 1984. 2(3): p. 181-197.17. Kleiman, S. Vnodes: An architecture for multiple file system types in Sun UNIX. 1986: Citeseer.18. Schroeder, B. and G. Gibson. Disk failures in the real world: What does an MTTF of 1,000,000 hours mean to you. 2007.19. Hey, T. and A. Trefethen, The Data Deluge: Grid Computing - Making the Global Infrastructure a Reality. 2003: John Wiley & Sons.20. Wang, F., et al. File system workload analysis for large scale scientific computing applications. 2004: Citeseer.21. Hargrove, W., F. Hoffman, and T. Sterling, The do-it-yourself supercomputer
Conference Session
Emerging Information Technologies
Collection
2009 Annual Conference & Exposition
Authors
Stephen Gilbert, Iowa State University; Pam Shill, Iowa State University; Kevin Saunders, Iowa State University
Tagged Divisions
Information Systems
requires careful project planning with the team mentor and facultymember. Time spent on the project is low in Week 1 and increases steadily until it occupiesstudents full-time in Weeks 8-10. In Week 3, groups make a presentation about their project’sresearch question and goals to the rest of the groups, citing major milestones and an anticipatedschedule. The project culminates in a five-page research paper, a poster presentation, and atechnology demo. Students present their posters and demos at a campus-wide REU ResearchSymposium. See Appendix B for a list of research projects from 2006-2008.HCI Course (Weeks 2 - 5) – LOs 1, 2, 3, 7, 8, 9, 12, 14This course introduces student to the key principles and theories of HCI and EIT. While in lessdepth
Conference Session
Computing Curriculum
Collection
2006 Annual Conference & Exposition
Authors
Alan Price, DeVry University-Pomona
Tagged Divisions
Information Systems
, Inc.9. Mammar, H.H. and F.T. Bernard, Incorporating Cognitive Styles into Adaptive Multimodal Interfaces.10. Witkin, H.A., et al., Field-dependent and field-independent cognitive styles and their educational implications. Review of Educational Research, 1977. 47: p. 1-64.11. Sadler-Smith, E. and B. Badger, Cognitive Style, Learning and Innovation. Technology Analysis & Strategic Management, 1998. 10(2): p. 247-265.12. Lo, J.-J. and P.-C. Shu, Identifying Learning Styles Through the Embedded Support Devices and Artificial Neural Network. 2002.13. Rumetshofer, H. and W. Wos. An Approach for Adaptable Learning Systems with Respect to Psychological Aspects. in SAC. 2003. Melbourne, FL.14. Chen, S.Y., A
Conference Session
IT-based Instructional Technologies
Collection
2010 Annual Conference & Exposition
Authors
Yi-Cheng Chen, Meiho Institute of Technology; Yi-Chien Lin, Meiho Institute of Technology; Ron Chuen Yeh, Meiho Institute of Technology, Taiwan; Kuo-Hung Tseng, Meiho Institute of Technology
Tagged Divisions
Information Systems
.83-88.4. Daniel, E. M. and Wilson, H. N., “The Role of Dynamic Capabilities in E-Business Transformation,” European Journal of Information Systems, 12(3), 2003, pp. 282-296.5. Fano, A. and Gershman, A., “The Future of Business Services in the Age of Ubiquitous Computing,” Communications of the ACM, 45(12), 2002, pp. 63-87.6. Islam, N. and Fayad, M., “Toward ubiquitous acceptance of ubiquitous computing,” Communications of the ACM, 46(12), 2003, pp. 89-92.7. Kannan, P. K., Chang, A. M., and Whinston, A. B., “Wireless Commerce: Marketing Issues and Possibilities,” The 34th Hawaii International Conference on System Sciences, 2001.8. King, K. P., “Educational Technology Professional Development as
Conference Session
Laboratory and Internship Innovations in IT/IS
Collection
2007 Annual Conference & Exposition
Authors
Robert Walters, Pennsylvania State University; John Bertoty, Blueroof Technologies, Inc.
Tagged Divisions
Information Systems
AC 2007-1219: TECHNOLOGICAL ASPECTS OF A SMART COTTAGE FORSENIORSRobert Walters, Pennsylvania State UniversityJohn Bertoty, Blueroof Technologies, Inc. Page 12.1375.1© American Society for Engineering Education, 2007 Development of a Smart Cottage for SeniorsAbstractThis paper presents the design, development and construction of a new kind of housing for seniorcitizens. A Smart Cottage for Seniors has been developed that is accessible, affordable and containstechnology to keep the seniors at home longer, safer and healthier. The cottage uses Universal designtechniques that ensure that the cottage will change with the needs of the occupants. A
Conference Session
Emerging Information Technologies
Collection
2010 Annual Conference & Exposition
Authors
Hugh Jack, Grand Valley State University
Tagged Divisions
Information Systems
AC 2010-62: A NEW MODEL FOR AUTHOR DRIVEN DIGITAL PUBLISHINGHugh Jack, Grand Valley State University Hugh Jack is a Professor in the School of Engineering at Grand Valley State University in Grand Rapids Michigan. His interests include Product Design and Manufacturing Engineering, with a particular focus in control systems. Page 15.67.1© American Society for Engineering Education, 2010 A New Model for Author Driven Digital PublishingAbstractBooks in print still dominate the college campus. The long-standing model for publishinginvolves corporate entities that take the work of an author and add value
Conference Session
Information and Network Security
Collection
2008 Annual Conference & Exposition
Authors
Peng Li, East Carolina University; Tijjani Mohammed, East Carolina University; Lee Toderick, East Carolina University; Chengcheng Li, East Carolina University; Philip Lunsford, East Carolina University
Tagged Divisions
Information Systems
AC 2008-1682: A PORTABLE VIRTUAL NETWORKING LAB FOR IT SECURITYINSTRUCTIONPeng Li, East Carolina UniversityTijjani Mohammed, East Carolina UniversityLee Toderick, East Carolina UniversityChengcheng Li, East Carolina UniversityPhilip Lunsford, East Carolina University Page 13.80.1© American Society for Engineering Education, 2008 A Portable Virtual Networking Lab for IT Security InstructionAbstractInformation and computer technology programs are facing several challenges such as rapiddevelopments of technologies, outdated lab equipment and materials, and increasing demands forremote labs from on-campus and distance education (DE) students. The purpose of this paper
Conference Session
Emerging Information Technologies
Collection
2008 Annual Conference & Exposition
Authors
Kyle Lutes, Purdue University; Richard Mislan, Purdue University, West Lafayette
Tagged Divisions
Information Systems
AC 2008-2195: THE DEVELOPMENT OF A FORENSICS TOOL FOR WINDOWSMOBILE DEVICESKyle Lutes, Purdue University Kyle Lutes is an Associate Professor of Computer & Information Technology (CIT). He has authored/co-authored numerous papers, many of which were presented at national conferences or published in trade magazines/journals as well as two college textbooks. His background and interests cover all areas of software development, including mobile computing, client/server information systems, web application development, object-oriented programming (OOP), programming languages, software engineering, user interface design, and rapid application development (RAD). Kyle has been writing
Conference Session
Information and Network Security
Collection
2009 Annual Conference & Exposition
Authors
Hugh Jack, Grand Valley State University; Christopher Pung, Grand Valley State University
Tagged Divisions
Information Systems
AC 2009-1658: A WEB-BASED APPROACH TO SENIOR UNDERGRADUATEPROJECT MANAGEMENTHugh Jack, Grand Valley State UniversityChristopher Pung, Grand Valley State University Page 14.143.1© American Society for Engineering Education, 2009
Conference Session
Information and Network Security
Collection
2009 Annual Conference & Exposition
Authors
Kyle Lutes, Purdue University; John Springer, Purdue University; Kelly Howard, Purdue University
Tagged Divisions
Information Systems
AC 2009-2375: A SURVEY OF EMBEDDED DATABASE TECHNOLOGY FORMOBILE APPLICATIONSKyle Lutes, Purdue University Kyle Lutes is an Associate Professor for the Department of Computer & Information Technology (CIT) at Purdue University. Kyle joined the department in 1998 and is the chair of the department’s software development curriculum. His teaching and scholarly interests cover a broad range of software development areas including software applications for mobile devices, data-centered application development, and software entrepreneurialism. He has authored/co-authored numerous papers and two college textbooks on various software development-related topics. Prior to his current
Conference Session
Information and Network Security
Collection
2008 Annual Conference & Exposition
Authors
Richard Smith, U. of St. Thomas - St. Paul
Tagged Divisions
Information Systems
AC 2008-89: BOUNDARIES AND FLOWS: A STRATEGY FOR INTRODUCINGINFORMATION SECURITY TO UNDERGRADUATESRichard Smith, U. of St. Thomas - St. Paul Assistant Professor at the University of St. Thomas and author of two books on information security. Page 13.255.1© American Society for Engineering Education, 2008 Boundaries and Flows: A Strategy for Introducing Information Security to UndergraduatesAbstractOutside of 2-year technical colleges, most postsecondary students aren’t offered coursework ininformation security until they have fulfilled upper division prerequisites in mathematics,software
Conference Session
Emerging Information Technologies
Collection
2010 Annual Conference & Exposition
Authors
Nipul Patel, Purdue University, North Central
Tagged Divisions
Information Systems
AC 2010-1234: WIRELESS NETWORKS IN THE HEALTH CARE INDUSTRY: ADISCONNECTNipul Patel, Purdue University, North Central Page 15.1376.1© American Society for Engineering Education, 2010 WIRELESS NETWORKS IN THE HEALTH CARE INDUSTRY: A DISCONNECTAbstractWireless networking is relatively new and exciting technology for health care. Using handheldperipherals and wireless networking technologies, medical professional can have omnipresentaccess to patient information, clinical functions, and business functions. Wireless networks bringinformation access, data collection capabilities, and clinical applications closer to the point ofcare than is possible using
Conference Session
Security
Collection
2006 Annual Conference & Exposition
Authors
Mario Garcia, Texas A&M University-Corpus Christi
Tagged Divisions
Information Systems
2006-331: PASSWORD AUDITING TOOLSMario Garcia, Texas A&M University-Corpus Christi Page 11.985.1© American Society for Engineering Education, 2006 Password Auditing ToolsAbstractA goal of computer system security is to prevent an attack, and authentication mechanisms canprevent a compromise on parts of a system. Most if not all forms of access are granted based ona single authentication scheme, and passwords are currently the most widely used authenticationmechanism. Weak passwords have been cited by experts from industry, government, andacademia as one of the most critical security threats to computer networks. However, variousapplications are
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2008 Annual Conference & Exposition
Authors
Azzedine Lansari, Zayed University; Akram Al-Rawi, Zayed University; Abdallah Tubaishat, Zayed Univeristy; Faouzi Bouslama, Université Laval
Tagged Divisions
Information Systems
AC 2008-1581: A COURSE SEQUENCE FOR INTEGRATING PROBLEMSOLVING AND CRITICAL THINKING IN A HYBRID OUTCOME-BASED IS/ITCURRICULUMAzzedine Lansari, Zayed University Azzedine Lansari received a Ph.D. from North Carolina State University in 1992. From 1993-1998, he was a senior researcher at MANTECH, NC. He joined the College of Information Systems at Zayed University in 1998. Currently he is an Associate Professor in the College of Information Technology. His research interests include systems modeling, educational technology and curriculum design in Information Systems.Akram Al-Rawi, Zayed University Akram Al-Rawi is a Sun certified Java Programmer and a Professor of CIS at Zayed University