Asee peer logo
Well-matched quotation marks can be used to demarcate phrases, and the + and - operators can be used to require or exclude words respectively
Displaying results 31 - 60 of 96 in total
Conference Session
Information and Network Security
Collection
2008 Annual Conference & Exposition
Authors
Okechi Egekwu, James Madison University
Tagged Divisions
Information Systems
AC 2008-2843: A WORLD WHERE EVERYTHING IS AUTOMATED: THECHALLENGES AND OPPORTUNITIES OF THE ROBUST RFIDINFRASTRUCTURE THAT WILL MAKE IT A REALITYOkechi Egekwu, James Madison University Okechi Geoffrey Egekwu obtained his PhD in Industrial & Systems Engineering from the University of Nebraska, Lincoln. He is currently a Full Professor in the Integrated Science and Technology (ISAT)program at James Madison University, Harrisonburg, VA, where he teaches undergraduate and graduate courses in the manufacturing and technology management areas. He also teaches operations management at MBA programs at James Madison University (JMU) and Eastern Mennonite University. Professor Egekwu worked in industry
Conference Session
Information Technologies Classroom Instruction
Collection
2008 Annual Conference & Exposition
Authors
Steven Hansen, University of St. Thomas
Tagged Divisions
Information Systems
AC 2008-2323: EXTENDED ACTIVE LEARNING AS A MEANS TO LEARNSYNTAX IN PROGRAMMING LANGUAGESSteven Hansen, University of St. Thomas Page 13.599.1© American Society for Engineering Education, 2008 Extended Active Learning As A Means To Learn Syntax in Programming LanguagesAbstractActive learning is an education form that has gained much interest in recent years. Manyinstructors can come up with schemes that help students better learn algorithmdevelopment, program development, project management, and other aspects of neededskills in the computer sciences. In the past decade, I worked on the development of activelearning techniques to learn syntax. I find
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2009 Annual Conference & Exposition
Authors
Phil Rawles, Purdue University; Anthony Smith, Purdue University; Raymond Hansen, Purdue University; Jeffrey Sprankle, Purdue University
Tagged Divisions
Information Systems
AC 2009-1453: REVISING A NETWORK ENGINEERING CURRICULUM TOREFLECT CURRENT INDUSTRY AND STUDENT TRENDSPhil Rawles, Purdue UniversityAnthony Smith, Purdue UniversityRaymond Hansen, Purdue UniversityJeffrey Sprankle, Purdue University Page 14.1033.1© American Society for Engineering Education, 2009 Revising a Network Engineering Curriculum to Reflect Current Industry and Student TrendsAbstractOne of the fastest changing areas of technology education is information technology. Within theInformation Technology (IT) field, the area of network engineering and security is changingespecially quickly. Ongoing issues such as machine and network security
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2010 Annual Conference & Exposition
Authors
Ashley Banaszek, Missouri University of Science and Technology; Hong Sheng, Missouri University of Science and Technology; Richard Hall, Missouri University of Science and Technology; Ronaldo Luna, Missouri University of Science and Technology; Ghulam Bham, Missouri University of Science and Technology
Tagged Divisions
Information Systems
AC 2010-1432: EVALUATION OF A WEB-BASED LEARNING TOOL FORTEACHING GIS WITHIN THE CONTEXT OF TRANSPORTATIONENGINEERINGAshley Banaszek, Missouri University of Science and TechnologyHong Sheng, Missouri University of Science and TechnologyRichard Hall, Missouri University of Science and TechnologyRonaldo Luna, Missouri University of Science and TechnologyGhulam Bham, Missouri University of Science and Technology Page 15.537.1© American Society for Engineering Education, 2010 Evaluation of a Web-Based Learning Tool for Teaching GIS within the Context of Transportation EngineeringAbstractAn exploratory study was conducted to evaluate a web-based learning
Conference Session
IT-based Instructional Technologies
Collection
2007 Annual Conference & Exposition
Authors
Judith Challinger, California State University, Chico; Rachael Teasdale, California State University, Chico
Tagged Divisions
Information Systems
AC 2007-1538: VISIT – VISUALIZATION AND INFORMATION TECHNOLOGY -A MULTI-TIER SYSTEM FOR INTERDISCIPLINARY EXPERIENCES IN DATACOLLECTION AND VISUALIZATIONJudith Challinger, California State University, ChicoRachael Teasdale, California State University, Chico Page 12.1590.1© American Society for Engineering Education, 2007 VisIT - Visualization and Information Technology - A Multi-tier System for Interdisciplinary Experiences in Data Collection and VisualizationAbstractCollaboration on interdisciplinary teams is an important experience for computer sciencestudents, and one that is too rarely available. Methods for data
Conference Session
Internet and Distributed Computing
Collection
2006 Annual Conference & Exposition
Authors
Philip Lunsford, East Carolina University; Lee Toderick, East Carolina University; Daniel Brooker, East Carolina University
Tagged Divisions
Information Systems
2006-559: A REMOTELY CONTROLLED AND ISOLATED COMPUTERNETWORK TEST BED FOR ATTACK UNDERSTANDING BASEDINFORMATION ASSURANCE DISTANCE EDUCATION COURSESPhilip Lunsford, East Carolina University Phil Lunsford received a B.S. in Electrical Engineering and a M.S. in Electrical Engineering from Georgia Institute of Technology and a Ph.D. in Electrical Engineering from North Carolina State University. He is a registered professional engineer and is currently an Assistant Professor at East Carolina University. His research interests include system simulation, telemedicine applications, and information assurance.Lee Toderick, East Carolina University Lee Toderick received a B.S. in Computer Science from
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2010 Annual Conference & Exposition
Authors
Matthew Verleger, Purdue University; Heidi Diefes-Dux, Purdue University
Tagged Divisions
Information Systems
AC 2010-1815: FACILITATING TEACHING AND RESEARCH ON OPEN-ENDEDPROBLEM SOLVING THROUGH THE DEVELOPMENT OF A DYNAMICCOMPUTER TOOLMatthew Verleger, Purdue UniversityHeidi Diefes-Dux, Purdue University Page 15.575.1© American Society for Engineering Education, 2010 Facilitating Teaching and Research on Open-Ended Problem Solving Through the Development of a Dynamic Computer ToolAbstractModel Eliciting Activities (MEAs) are realistic open-ended problems set in engineering contexts;student teams draw on their diverse experiences both in and out of the classroom to develop amathematical model explicated in a memo to the client. These activities have been implementedin
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2007 Annual Conference & Exposition
Authors
Azzedine Lansari, Zayed University; Akram Al-Rawi, Zayed University; Faouzi Bouslama, Université Laval
Tagged Divisions
Information Systems
student needs to develop b. Development of specific learning outcomes from these skill areas c. Identification of appropriate learning strategies to achieve learning outcomes d. Identification of indicators that establish the student has achieved learning outcomes e. Collection of pieces of evidence that demonstrates the student has met the performance indicators f. Organization and presentation of the evidence in a portfolio supplemented with commentaries to support student workAt Zayed University, the purpose of outcome-based learning assessment is to improve the qualityof learning and teaching in the College of Information Systems. It is based on three fundamentalprinciples: Student learning is the focus in
Conference Session
Emerging Information Technologies
Collection
2009 Annual Conference & Exposition
Authors
C. Richard Helps, Brigham Young University; Bret Swan, Brigham Young University
Tagged Divisions
Information Systems
skills, and employcreativity in proposing new solutions.Their capstone process included an analysis phase, a design phase, a validation phase and aproduction phase.The analysis phase includes: A. Review of family science research to identify common traits or factors that build strong families. a. A number of references were found which discuss the relationship between technology and families and also define characteristics of strong families.11-15 B. Review of IT-related literature to identify what effects different information technologies have had on families. C. Defining target users demographic a. The selected user characteristics were: Caucasian families with 1 or more children
Conference Session
DB & Information Integration
Collection
2006 Annual Conference & Exposition
Authors
Reza Sanati-Mehrizy; Curtis Welborn, Utah Valley State College; Afsaneh Minaie, Utah Valley State College
Tagged Divisions
Information Systems
following constraint characteristics: cardinalityconstraints, attribute value constraints, polymorphic constraints and temporal constraints.References1. The Business Rules Group, “Defining Business Rules – What Are They Really?”, February, 2006, http:www.BusinessRulesGroup.org2. Perkins, “Business Rules = Meta Data”, The proceedings of the: Technology of Object-Oriented Languages and Systems, IEEE, 2000. Page 11.1082.73. J. A. Hoffer, M. B. Prescott and F. R. McFadden, “Modern Database Management”, Seventh Edition, Prentice Hall, 2005.4. G. Ronald Ross, “Business Rule Concepts”, Business Rule Solutions Inc., 1998.5
Conference Session
Laboratory and Internship Innovations in IT/IS
Collection
2007 Annual Conference & Exposition
Authors
Michael Bailey, Brigham Young University; Michael Moore, Brigham Young University; Joseph Ekstrom, Brigham Young University
Tagged Divisions
Information Systems
system.User network authentication within the university lab has not yet been addressed, but research isin process.Bibliography1. Campbell, A., Pargas, R., “Laptops in the Classroom”, Proceedings of SIGCSE’03, Feb. 2003, pp. 98-1022. Leone, J., Hartpence, B., Weber, B., “A Networking and System Administration Laboratory Infrastructure”,Proceedings of CITC3, Rochester, NY, 2002, session 2613. Higby, C., Blackham, N., Rogers, B., Bailey, M., “Re-imaging Computers for Multi-purpose Labs”, Computersin Education Journal, v 15, no. 3, 2005, pp. 34-404. Tarnoff, D., “Shifting Students’ Financial Responsibilities form Textbooks to Laboratory Resources”, Journalof Computing Sciences in Colleges, v 22, no. 3, January 2007, pp. 237-243
Conference Session
Information Technologies Classroom Instruction
Collection
2008 Annual Conference & Exposition
Authors
Mohammad Dadfar, Bowling Green State University
Tagged Divisions
Information Systems
AC 2008-2882: NETWORK PROCESSES COMMUNICATION: CLASS PROJECTSMohammad Dadfar, Bowling Green State University MOHAMMAD B. DADFAR Mohammad B. Dadfar is an Associate Professor in the Computer Science Department at Bowling Green State University. His research interests include Computer Extension and Analysis of Perturbation Series, Scheduling Algorithms, and Computers in Education. He currently teaches undergraduate and graduate courses in data communications, operating systems, and computer algorithms. He is a member of ACM and ASEE. Page 13.925.1© American Society for Engineering Education, 2008 Network
Conference Session
Emerging Information Technologies
Collection
2008 Annual Conference & Exposition
Authors
Curtis Welborn, Utah Valley State College; Reza Sanati-Mehrizy, Utah Valley State College
Tagged Divisions
Information Systems
relationships would add unnecessary complexity to this paper. Page 13.1194.8References[1] James F. Allen, “Maintaining Knowledge about Temporal Intervals”, Communications of the ACM, pp. 832-843, 1983.[2] James F. Allen, “Towards a General Theory of Action and Time”, Artificial Intelligence 23 pp. 123-154, 1984.[3] Reza Sanati Mehrizy, Curtis Welborn, Afsaneh Minaie, ”Representing and Enforcing Business Rules in Relational Data Model”, American Society for Engineering Education (ASEE) 2006.[4] J. A. Hoffer, M. B. Prescott and F. R. McFadden, “Modern Database Management”, Seventh Edition, Prentice Hall, 2005.[5] A
Conference Session
IT-based Instructional Technologies
Collection
2008 Annual Conference & Exposition
Authors
Abul Azad, Northern Illinois University; Ghayasuddin Mohammed, Northern Illinois University; Mohammed Murtuza, Northern Illinois University; Muhammed Abedur Rahman, Northern Illinois University
Tagged Divisions
Information Systems
inputs and boundary conditions1, 2. A virtualfacility can have two purposes: a) to facilitate the feasibility study of an engineering systemwhile in the planning stage, and based on the study, designers can adjust the parameters duringtheir final planning so the anticipated system can serve its purpose and b) to study the behaviorand control of a complex engineering system for educational and research purposes withoutbuilding the system. The development of these virtual facilities can involve expertise withcomplex mathematical solutions with tedious software developments and effective graphical userinterface 3. Considering the level of involvement, sometimes it is difficult for an individualinstitution to develop and maintain such
Conference Session
Computing Curriculum
Collection
2006 Annual Conference & Exposition
Authors
Frank Kowalkowski, Knowledge Consultants; Gilbert Laware, Purdue University
Tagged Divisions
Information Systems
Page 11.1200.5process and finally organizations that use the process.There is a basic context analysis protocol or general series of steps for the analysis of contextthat we can use: 1. Gather material about key context categories such as locations, organizations, technology or documents. 2. Gather/locate the target processes of interest 3. Create a core set of context matrices 4. Assess impact and create a ranking by category 5. Combine ranks into a composite ranking 6. Use three analytics techniques: a. Ranking of dimensions by attributes b. Ranking by frequency c. Inference of impact related to changers in:A combination of frequency of reference plus some quantitative and qualitative attributes of
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2008 Annual Conference & Exposition
Authors
Henry Chaya, Manhattan College
Tagged Divisions
Information Systems
or server.In the survey students commented that they could replay particular sections of the video to clarify pointsthey might have missed in the first hearing. Many students were not fluent in English and often do notunderstand certain points made in an oral lecture. The recorded videos help to alleviate this problem.During the first course offering in spring 2007, all the students passed with the majority of the gradesbeing B or B+. During the second offering in spring 2007, again all students passed. The majority ofgrades were A and the class average of 87%.In the fall of 2007 the author had the opportunity to teach 18 of the same students from the spring 2007class in a conventional lecture course. The course title was "Artificial
Conference Session
IT-based Instructional Technologies
Collection
2009 Annual Conference & Exposition
Authors
Mysore Narayanan, Miami University
Tagged Divisions
Information Systems
systematic use of technology actually helpsinstructors address perceptual dimensions of learning. Technology should not beviewed just as a growing trend; rather it must be intelligently implemented as avaluable instructional tool that can accommodate diverse learning styles of 21stcentury students. (Watkins, 2005). It is important to acknowledge that studentslearn better when alternative modes of information processing are made availableat college campuses. Dr. Walter B. Barbe, a nationally known authority in thefields of reading and learning disabilities has shown that perceptual modalitystyles provides an indication of an individual’s dominant learning mode. Thedegree of processing speed, accuracy and retention that an individual is able
Conference Session
Internet and Distributed Computing
Collection
2006 Annual Conference & Exposition
Authors
Xiannong Meng, Bucknell University; Luiz Perrone, Bucknell University; Maurice Aburdene, Bucknell University
Tagged Divisions
Information Systems
recentlyused as laboratory assignments and semester projects in undergraduate and graduate courses. Asummary of our findings is presented in this paper.IntroductionMany universities have used different protocols and products for hands-on experiences inwireless and mobile network courses. The protocols and standards include IEEE 802.11 (a, b, gor simply WiFi), Bluetooth, IEEE 802.15.4 and Zigbee, sensor networks based on the standardBerkeley “mote” platform implemented in products such as WeC, Rene, Dot, MICA, and Telos.Many of the products use TinyOS, a small operating system targeted for minimum hardware.We present a summary of hands-on laboratory exercises we found on the Internet. In Vassar’sCMPU-395, students are asked to implement a simplified
Conference Session
IT-based Instructional Technologies
Collection
2008 Annual Conference & Exposition
Authors
Clifton Kussmaul, Muhlenberg College
Tagged Divisions
Information Systems
this evaluation process can be a goodexperience for students or student teams. We recommend the following process: Page 13.952.5 1. Identify your requirements and preferences, and prioritize them as essential, desirable, or potential useful in the future. include factors such as: a. Language support, particularly if English is not the preferred language. b. Licensing options, particularly if the tools may be used for commercial activity. c. Technology: hardware, operating system, programming language, database. 2. Identify and quickly assess candidate tools. Start with general descriptions, including
Conference Session
Emerging Information Technologies
Collection
2010 Annual Conference & Exposition
Authors
Susan Miertschin, University of Houston; Cheryl Willis, University of Houston
Tagged Divisions
Information Systems
applications may provide further insight.ConclusionsThis paper reviewed the historical underpinnings of cloud computing along with an overview ofthe technology background of cloud computing. The final sections of the paper described theresults of an action research project that was implemented to address the implementation of acloud computing application in an undergraduate information systems class.Bibliography1. Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R. H., Konwinski, A., et al. (2009). Above the Clouds: A Berkeley View of Cloud Computing EECS Department, University of California, Berkeley.2. Editions and Pricing. (2009). Retrieved from http://www.salesforce.com/crm/editions-pricing.jsp3. Hayes, B. (2008). Cloud computing
Conference Session
Computing Curriculum
Collection
2006 Annual Conference & Exposition
Authors
Akram Al-Rawi, Zayed University; Azzedine Lansari, Zayed University; Faouzi Bouslama, Zayed University
Tagged Divisions
Information Systems
). Page 11.787.4Protocols and Standards2.1 Identify a MAC (Media Access Control) address and its parts.2.2 Identify the seven layers of the OSI (Open Systems Interconnect) model and their functions.2.3 Identify the OSI (OSI) layers at which the following network components operate:2.4 Differentiate between network protocols in terms of routing, addressing schemes, interoperability and naming conventions2.5 Identify the components and structure of IP (Internet Protocol) addresses (IPv4, IPv6) and the required setting for connections across the Internet.2.6 Identify classful IP (Internet Protocol) ranges and their subnet masks (example: Class A, B and C).2.7 Identify the purpose of subnetting2.8 Identify the differences between private
Conference Session
Information and Network Security
Collection
2008 Annual Conference & Exposition
Authors
Barry Cumbie, Auburn University; Chetan Sankar, Auburn University; P.K. Raju, Auburn University
Tagged Divisions
Information Systems
. International Journal of Information Management, 26(2), 128-141.6. Marshall, J., & Heffes, E. M. (2006). Surveys: Data losses spur consumer flight. Financial Executive, 22(1), 10.7. Lewis, D. (2005). Personal disaster recovery software: An essential part of business disaster recovery plans. Computer Technology Review, 25(6), 10.8. LaPage, A. & Gaylord, K. (2003). Protect against data loss with W2K’s backup utility. Windows Professional, 8(2), 8-12.9. Freeman, E. Q. (2000). E-merging risks: Operational issues and solutions in a cyberage. Risk Management, 47(7), 12-15.10. Eckert, B. (2006). Protect computerized data with off-site backups. Nursing Homes, 55(5), 42.11. Duke, B. (2006). Data security: behind the
Conference Session
Emerging Information Technologies
Collection
2007 Annual Conference & Exposition
Authors
Janell Armstrong, Brigham Young University; C. Richard Helps, Brigham Young University
Tagged Divisions
Information Systems
http://www.zigbee.org/en/press/press_kit_010207/PressRoom/064337r00ZB_MWG-ZIGBEE-MEMBERS- SHIP-10,000-DEVELOPER-KITS,-SPEC-DOWNLOADS.pdf16. Bluetooth SIG (2006). Get Involved: Membership Online Resources. Retrieved January 17, 2007 from https://www.bluetooth.org/bluetooth/landing/membership.php17. ZigBee Alliance (2006). Member Benefits. Retrieved January 17, 2007 from http://www.zigbee.org/en/join/benefits.asp18. Bluetooth SIG (2007). Compare With Other Technologies. In Bluetooth Technology. Retrieved January 17, 2007 from http://www.bluetooth.com/Bluetooth/Learn/Technology/Compare19. Adams J. & Heile B. (2006). Busy as a ZigBee. Spectrum. 43(10). Online content. Retrieved January 17, 2007 from http
Conference Session
Internet and Distributed Computing
Collection
2006 Annual Conference & Exposition
Authors
Fani Zlatarova, Elizabethtown College
Tagged Divisions
Information Systems
× σYear=2005 S C σYear=2005 S C A S A S A A (a) (b) (c) (d) πSName πSName πSName πSName σA.CNo=C.CNo σA.CNo=C.CNo >< ><
Conference Session
Information and Network Security
Collection
2009 Annual Conference & Exposition
Authors
Nestor Osorio, Northern Illinois University; Andrew Otieno, Northern Illinois University
Tagged Divisions
Information Systems
(IRETE)AbstractEngineers work in settings that are dictated by global perspectives. This places a need forengineers who can operate seamlessly in global environments. A key component for the successof this seamless knowledge exchange is the development of information repositories for theengineering fields. E-Lis < http://eprints.rclis.org > is an example of such a repository fordocuments, published or unpublished, on librarianship, information science and technology.IRETE will be a repository totally focused to the world-wide community of scholars and teachersdedicated to engineering education. IRETE will operate with an administrative group under theleadership of a Principal Investigator or Director. Several working groups will focus on
Conference Session
Security
Collection
2006 Annual Conference & Exposition
Authors
Tim Lin, California State Polytechnic University-Pomona; Saeed Monemi, California State Polytechnic University-Pomona
Tagged Divisions
Information Systems
) using concepts like Authentication Header, Encapsulating Security Payload inPowerpoint files. There is in general no student involvement (in some of IPSec code forexample).WEPWEP (Wired Equivalent Privacy), a part of IEEE 802.11 protocols, is a wireless protocol thatpeople know well its vulnerability. The reason is due to that the initialization vectors areencrypted using the XOR (exclusive or) operation. Though XOR can scramble the bits well, it iseasy to break since if C = A XOR B, then A = C XOR B from elementary Boolean algebra. As aconsequence, WEP is subject to the so called known plaintext attack.The coverage of WEP before was limited to the explanation of its vulnerability (stage 1). It canbe enhanced as a demonstration in the class (or
Conference Session
Information and Network Security
Collection
2010 Annual Conference & Exposition
Authors
HongLi Luo, Indiana University-Purdue University, Fort Wayne
Tagged Divisions
Information Systems
fundamental concepts of networking, but also helps the students gainexperiences of managing a local area network. The lab assignments can also be used for theonline courses since the student have easy and full access to the home network.Bibliography[1] E. Freudenthal, F. Kautz, B. Das, and L. Longpre, A Virtualized Network Teaching Laboratory, ASEE 2009.[2] Java, http://www.java.com/en/download/index.jsp.[3] Data Communications and Networking, 4th Edition, by Behrouz A. Forouzan, McGraw-Hill, 2007.[4] Wireless-G Broadband Router, Model:WRT54GL, User Guide.[5] J. Loddo and L. Saiu. Marionnet: A Virtual Network Laboratory and Simulation Tool, SimulationWorks, 2008.[6] Wireshark, http://www.wireshark.org/.[7] D-Link AirPlus Xtreme GTM DI-624 High-Speed
Conference Session
IT-based Instructional Technologies
Collection
2007 Annual Conference & Exposition
Authors
Edward Gehringer, North Carolina State University
Tagged Divisions
Information Systems
teams in information systemseducation. SIGMIS Database 27, 2 (Apr. 1996), 44-60.[10] Freeman, E., Freeman, E., Bates, B. and Sierra, K. Head First Design Patterns. O'Reilly, 2004.[11] Gehringer, E. F., Deibel, K., Hamer, J., and Whittington, K. J. 2006. cooperative learning: beyond pairprogramming and team projects. In Proceedings of the 37th SIGCSE Technical Symposium on Computer ScienceEducation (Houston, Texas, USA, March 03 - 05, 2006). SIGCSE '06. ACM Press, New York, NY, 458-459.[12] Grissom, S. and Van Gorp, M. J. 2000. A practical approach to integrating active and collaborative learninginto the introductory computer science curriculum. In Proceedings of the Seventh Annual Consortium on Computingin Small Colleges Midwestern Conference
Conference Session
Information Technologies Classroom Instruction
Collection
2008 Annual Conference & Exposition
Authors
Robert MacDonald, Purdue University; Raheel Malik, Whirlpool Corp.; Anthony Smith, Purdue University; James Goldman, Purdue University
Tagged Divisions
Information Systems
developing802.11s, a set of standards defining wireless mesh distribution systems. These standards wouldgreatly benefit this research, but are currently unfinished and a proprietary solution had to beutilized.Proxim AP-4900M access points were utilized for this research. These models supported allthree types of distribution systems (wired, WDS, and mesh) and are equipped with two separateradios. One of the radios was dedicated to 802.11b/g traffic, and one was dedicated to 802.11atraffic. There was no WEP/WPA security on any access points, and the AP was set to openauthentication. The client utilized was a Dell Latitude D620, utilizing the built-in IntelPRO/Wireless 3945ABG 802.11a/b/g card with version 10.5.1.72 of the manufacturer’s drivers.In each
Conference Session
Laboratory and Internship Innovations in IT/IS
Collection
2007 Annual Conference & Exposition
Authors
Ed Crowley, University of Houston
Tagged Divisions
Information Systems
12.490.2Rather than researching new cryptographic algorithms, our students focus on evaluatingcryptographic implementations in the context of particular enterprise security goal(s). Inthese evaluations, our students draw on existing standards and standard organizationssuch as the Security Requirements for Cryptographic Modules (FIPS-140) [2] and theNational Institute for Standards and Technology (NIST). A look at sample learning goalsfor our laboratory module’s will help illustrate this.Sample Module GoalsAt the end of this class, students will be able to:1. Apply cryptographic services to: a. Conceal information within a file (encryption). b. Verify a file’s integrity c. Authenticate a file’s origin2. Provide evidence of non