AC 2008-1682: A PORTABLE VIRTUAL NETWORKING LAB FOR IT SECURITYINSTRUCTIONPeng Li, East Carolina UniversityTijjani Mohammed, East Carolina UniversityLee Toderick, East Carolina UniversityChengcheng Li, East Carolina UniversityPhilip Lunsford, East Carolina University Page 13.80.1© American Society for Engineering Education, 2008 A Portable Virtual Networking Lab for IT Security InstructionAbstractInformation and computer technology programs are facing several challenges such as rapiddevelopments of technologies, outdated lab equipment and materials, and increasing demands forremote labs from on-campus and distance education (DE) students. The purpose of this paper
AC 2008-2195: THE DEVELOPMENT OF A FORENSICS TOOL FOR WINDOWSMOBILE DEVICESKyle Lutes, Purdue University Kyle Lutes is an Associate Professor of Computer & Information Technology (CIT). He has authored/co-authored numerous papers, many of which were presented at national conferences or published in trade magazines/journals as well as two college textbooks. His background and interests cover all areas of software development, including mobile computing, client/server information systems, web application development, object-oriented programming (OOP), programming languages, software engineering, user interface design, and rapid application development (RAD). Kyle has been writing
AC 2008-89: BOUNDARIES AND FLOWS: A STRATEGY FOR INTRODUCINGINFORMATION SECURITY TO UNDERGRADUATESRichard Smith, U. of St. Thomas - St. Paul Assistant Professor at the University of St. Thomas and author of two books on information security. Page 13.255.1© American Society for Engineering Education, 2008 Boundaries and Flows: A Strategy for Introducing Information Security to UndergraduatesAbstractOutside of 2-year technical colleges, most postsecondary students aren’t offered coursework ininformation security until they have fulfilled upper division prerequisites in mathematics,software
AC 2008-1581: A COURSE SEQUENCE FOR INTEGRATING PROBLEMSOLVING AND CRITICAL THINKING IN A HYBRID OUTCOME-BASED IS/ITCURRICULUMAzzedine Lansari, Zayed University Azzedine Lansari received a Ph.D. from North Carolina State University in 1992. From 1993-1998, he was a senior researcher at MANTECH, NC. He joined the College of Information Systems at Zayed University in 1998. Currently he is an Associate Professor in the College of Information Technology. His research interests include systems modeling, educational technology and curriculum design in Information Systems.Akram Al-Rawi, Zayed University Akram Al-Rawi is a Sun certified Java Programmer and a Professor of CIS at Zayed University
AC 2008-2843: A WORLD WHERE EVERYTHING IS AUTOMATED: THECHALLENGES AND OPPORTUNITIES OF THE ROBUST RFIDINFRASTRUCTURE THAT WILL MAKE IT A REALITYOkechi Egekwu, James Madison University Okechi Geoffrey Egekwu obtained his PhD in Industrial & Systems Engineering from the University of Nebraska, Lincoln. He is currently a Full Professor in the Integrated Science and Technology (ISAT)program at James Madison University, Harrisonburg, VA, where he teaches undergraduate and graduate courses in the manufacturing and technology management areas. He also teaches operations management at MBA programs at James Madison University (JMU) and Eastern Mennonite University. Professor Egekwu worked in industry
AC 2008-2323: EXTENDED ACTIVE LEARNING AS A MEANS TO LEARNSYNTAX IN PROGRAMMING LANGUAGESSteven Hansen, University of St. Thomas Page 13.599.1© American Society for Engineering Education, 2008 Extended Active Learning As A Means To Learn Syntax in Programming LanguagesAbstractActive learning is an education form that has gained much interest in recent years. Manyinstructors can come up with schemes that help students better learn algorithmdevelopment, program development, project management, and other aspects of neededskills in the computer sciences. In the past decade, I worked on the development of activelearning techniques to learn syntax. I find
AC 2008-2882: NETWORK PROCESSES COMMUNICATION: CLASS PROJECTSMohammad Dadfar, Bowling Green State University MOHAMMAD B. DADFAR Mohammad B. Dadfar is an Associate Professor in the Computer Science Department at Bowling Green State University. His research interests include Computer Extension and Analysis of Perturbation Series, Scheduling Algorithms, and Computers in Education. He currently teaches undergraduate and graduate courses in data communications, operating systems, and computer algorithms. He is a member of ACM and ASEE. Page 13.925.1© American Society for Engineering Education, 2008 Network
relationships would add unnecessary complexity to this paper. Page 13.1194.8References[1] James F. Allen, “Maintaining Knowledge about Temporal Intervals”, Communications of the ACM, pp. 832-843, 1983.[2] James F. Allen, “Towards a General Theory of Action and Time”, Artificial Intelligence 23 pp. 123-154, 1984.[3] Reza Sanati Mehrizy, Curtis Welborn, Afsaneh Minaie, ”Representing and Enforcing Business Rules in Relational Data Model”, American Society for Engineering Education (ASEE) 2006.[4] J. A. Hoffer, M. B. Prescott and F. R. McFadden, “Modern Database Management”, Seventh Edition, Prentice Hall, 2005.[5] A
inputs and boundary conditions1, 2. A virtualfacility can have two purposes: a) to facilitate the feasibility study of an engineering systemwhile in the planning stage, and based on the study, designers can adjust the parameters duringtheir final planning so the anticipated system can serve its purpose and b) to study the behaviorand control of a complex engineering system for educational and research purposes withoutbuilding the system. The development of these virtual facilities can involve expertise withcomplex mathematical solutions with tedious software developments and effective graphical userinterface 3. Considering the level of involvement, sometimes it is difficult for an individualinstitution to develop and maintain such
or server.In the survey students commented that they could replay particular sections of the video to clarify pointsthey might have missed in the first hearing. Many students were not fluent in English and often do notunderstand certain points made in an oral lecture. The recorded videos help to alleviate this problem.During the first course offering in spring 2007, all the students passed with the majority of the gradesbeing B or B+. During the second offering in spring 2007, again all students passed. The majority ofgrades were A and the class average of 87%.In the fall of 2007 the author had the opportunity to teach 18 of the same students from the spring 2007class in a conventional lecture course. The course title was "Artificial
this evaluation process can be a goodexperience for students or student teams. We recommend the following process: Page 13.952.5 1. Identify your requirements and preferences, and prioritize them as essential, desirable, or potential useful in the future. include factors such as: a. Language support, particularly if English is not the preferred language. b. Licensing options, particularly if the tools may be used for commercial activity. c. Technology: hardware, operating system, programming language, database. 2. Identify and quickly assess candidate tools. Start with general descriptions, including
. International Journal of Information Management, 26(2), 128-141.6. Marshall, J., & Heffes, E. M. (2006). Surveys: Data losses spur consumer flight. Financial Executive, 22(1), 10.7. Lewis, D. (2005). Personal disaster recovery software: An essential part of business disaster recovery plans. Computer Technology Review, 25(6), 10.8. LaPage, A. & Gaylord, K. (2003). Protect against data loss with W2K’s backup utility. Windows Professional, 8(2), 8-12.9. Freeman, E. Q. (2000). E-merging risks: Operational issues and solutions in a cyberage. Risk Management, 47(7), 12-15.10. Eckert, B. (2006). Protect computerized data with off-site backups. Nursing Homes, 55(5), 42.11. Duke, B. (2006). Data security: behind the
developing802.11s, a set of standards defining wireless mesh distribution systems. These standards wouldgreatly benefit this research, but are currently unfinished and a proprietary solution had to beutilized.Proxim AP-4900M access points were utilized for this research. These models supported allthree types of distribution systems (wired, WDS, and mesh) and are equipped with two separateradios. One of the radios was dedicated to 802.11b/g traffic, and one was dedicated to 802.11atraffic. There was no WEP/WPA security on any access points, and the AP was set to openauthentication. The client utilized was a Dell Latitude D620, utilizing the built-in IntelPRO/Wireless 3945ABG 802.11a/b/g card with version 10.5.1.72 of the manufacturer’s drivers.In each
AC 2008-129: BUILDING AN EDUCATION PROGRAM FOR ENGINEERS INDIGITAL FORENSICSDavid Dampier, Mississippi State University Page 13.264.1© American Society for Engineering Education, 2008 Building an Education Program for Engineers in Digital Forensics David A. Dampier Jansen Cohoon Department of Computer Science and Engineering Mississippi State University dampier@cse.msstate.edu; jec9@msstate.eduAbstractThis paper describes an innovative laboratory based program that offers life-long learningactivities to working professionals in the law
AC 2008-2331: NOVEL TECHNOLOGY FOR ELECTRONICS INSTRUCTION –AN ELECTRONICS STUDIOArunachala Nadar Mada Kannan, Arizona State University Research focus is in the field of Alternative Energy Technologies, more specifically in fuel cells. Developed a brand new undergraduate course on Electronics projects and has been using the e-Studio as an effective teaching tool.Barbara Rempel, Arizona State University, Polytechnic campus An Edicator in the field of Electronics Engineering Technology for the past 17 years. Cureently involved in creating electronics embedded systems concentration for the undergraduate degree program. Her expertise involves, design and development of electronic circuits FPGA systems
AC 2008-1484: ASSESSING STUDENTS' WIKI CONTRIBUTIONSEdward Gehringer, North Carolina State University Page 13.230.1© American Society for Engineering Education, 2008 Assessing Students’ Wiki Contributions Edward F. Gehringer North Carolina State University efg@ncsu.eduAbstractPerhaps inspired by the growing attention given to Wikipedia, instructors have increasingly beenturning to wikis [1, 2] as an instructional collaborative space. A major advantage of a wiki isthat any user can edit it at any time. In a class setting, students may be restricted in
from Southern Illinois University in 1990 and 1995 respectively. He is currently Professor and chairperson of Industrial and Engineering Technology Department at Southeast Missouri State University, Cape Girardeau. His research interests are in the areas of image processing, control systems, and robotics.Xiaobing Hou, Southeast Missouri State University Xiaobing Hou (xhou@semo.edu) is a joint faculty of the Industrial and Engineering Technology Department and Computer Science Department at Southeast Missouri State University. He received the Ph.D. degree from the University of Pittsburgh. His current research and teaching interests are telecommunications and computer networking
AC 2008-1592: INTEGRATING THE SECURITY+ EXAM OBJECTIVES INTOINFORMATION TECHNOLOGY CURRICULAAkram Al-Rawi, KFU Akram Al-Rawi is a Professor of Computer Science at King Faisal University, Saudi Arabia. He has worked at several academic institutions of which the last three were Zayed University, University of Missouri- Columbia, and Columbia College, MO. His teaching interests include programming languages, networks, logic design, and computer architecture. His research interests include computer simulation, wireless, security, embedded systems, and curriculum design. He holds certifications in A+, Network+, Sun Certified Java Programmer, ICDL, i-Net+, Server+ and CCAI.Azzedine Lansari, Zayed
AC 2008-1463: GROUP COMMUNICATION VIA TECHNOLOGY FORENGINEERING WORK: PERCEPTIONS ON EFFECTIVENESSDenise Bauer, Pennsylvania State University, University ParkGül Okudan, Pennsylvania State University Page 13.655.1© American Society for Engineering Education, 2008 Group Communication via Technology for Engineering Work: Perceptions on EffectivenessIntroductionGroup work is an important part of the engineering curriculum as employers are stressing theneed for future engineers to be able to work collaboratively with those both in and out of theirpreferred field. The use of technology in the classroom is also becoming a necessity as moststudents today