Program

The RIIT 2014 program and SIGITE 2014 program are available for free viewing through the ACM Digital Library during the conference and two weeks after it ends.

Wednesday, October 15, 2014
2:00 – 5:00 pm
IT Chairs Meeting (attendance by RSVP) Room: Suwanee
Thursday, October 16, 2014
9:30 – 12:00 pm
SIGITE Executive Committee Meeting Room: Suwanee
12:30 – 2:30 pm
Plenary session Room: Heritage Ballroom
  • Welcome remarks: Becky Rutherfoord and Rob Friedman
  • Best paper awards: Amber Settle and Terry Steinbach
  • Supporter introductions: EMC2, Academic Alliance, NetApp, and Oracle Academy
  • Keynote: Dr. Flavio Villanustre, VP Technology Architecture & Product for LexisNexis and HPCC Systems.

Session A B
2:30 – 3 pm
Break Room: Heritage Pre-Function Area
3 – 4:30 pm Workshop
Room: Heritage A
Paper: RIIT/SIGITE
Chair: Dale Rowe, Brigham Young University
Room: Heritage C
Session 1
Prospects & Practices for End-User Development Activities in Business Computing Education Umar Ruhi,
University of Ottawa
Eye Tracking Data Understanding for Product Representation Studies Brandeis Marshall,
Purdue UniversityShweta Sareen,
Purdue UniversityJohn Springer,
Purdue UniversityTahira Reid,
Purdue University
Software Architecture Model Driven Reverse Engineering Approach to Open Source Software Development Sam Chung,
Southern Illinois UniversityWilliam Kim,
University of Washington TacomaBarbara Endicott-Popovsky,
University of Washington Seattle
A Virtualized Testbed with Physical Outlets for Hands-on Computer Networking Education
Mark Schmidt,
University of TuebingenFlorian Heimgaertner,
University of TuebingenMichael Menth,
University of Tuebingen
4:40 – 6:10 pm Paper: SIGITE
Chair: Ed Sobiesk, U.S. Military Academy
Room: Heritage A
Paper: SIGITE
Chair: Amber Settle, DePaul University
Room: Heritage C
Session 2
Teaching a Networking Class for Freshmen: Course Design and Lessons Learned Yang Wang,
La Salle UniversityThomas Blum,
La Salle UniversityMargaret McCoey,La Salle University
FLaSKU – A Classroom Experience with Teaching Computer Networking: Is it useful to others in the field? Shan Suthaharan,
UNC Greensboro
Analysis of Source Code Snapshot Granularity Levels Arto Vihavainen,
University of HelsinkiMatti Luukkainen,University of HelsinkiPetri Ihantola,
Aalto University
An Analysis of Team Performance in High School Programming Contests Heidi Ellis,
Western New England UniversityStoney Jackson,
Western New England UniversityRobert Crouse,
Western New England University
Automatically Detectable Indicators of Programming Assignment Difficulty Petri Ihantola,
Aalto UniversityJuha Sorva,
Aalto UniversityArto Vihavainen,
University of Helsinki
7:00 pm
Reception Buckhead Foyer

 

Friday, October 17, 2014
Session A B C
9 – 10:30 am Paper: RIIT
Chair: Ray Trygstad, Illinois Institute of Technology
Room: Heritage A
Paper: SIGITE
Chair: Mark Stockman, University of Cincinnati
Room: Heritage B
Paper: SIGITE
Chair: Joseph J. Ekstrom, Brigham Young University
Room: Heritage C
Session 3
Printer Water-Mark Obfuscation Maya Embar,
Illinois Institute of TechnologyWilliam Wesselman,
Illinois Institute of TechnologyLouis McHugh,
Illinois Institute of Technology
Probabilistically Detecting Steganography withinMP3 Files Ben Khodja,
Illinois Institute of Technology
Passive Warden Using Statistical Steganalysis David Stacey,
Illinois Institute of Technology
Enhancing the Comprehension of Network Sniffing Attack in Information Security Education using a Hands-on lab Approach Zouheir Trabelsi,
UAE University
Bottleneck Analysis with NetKit: Teaching Information on Security with Hands-On Labs Svetlana Peltsverger,
Southern Polytechnic State UniversityChi Zhang,
Southern Polytechnic State University
Curricular and Performance Measurement Challenges in Cloud Environments Bruce Hartpence,
RIT
Capstone Experience – Achieving Success with an Undergraduate Research Group in Speech Michael Jonas,
UNH Manchester
The evolution of Information Technology capstone projects into research projects Susan Chard,
Whitireia PolytechnicBrenda Lloyd,
Whitireia Polytechnic
Student Initiated Capstone Projects Alan Fedoruk,
Mount Royal UniversityMingwei Gong,
Mount Royal UniversityMichael McCarthy,
Mount Royal University
10:40 am – 12:10 pm Paper: RIIT
Chair: Jack Zheng, Southern Polytechnic State University
Room: Heritage A
Paper: SIGITE
Chair: Kris Nagel, Georgia Gwinnett College
Room: Heritage B
Lightning talks
Chair: Terry Steinbach, DePaul University
Room: Heritage C
Session 4
Detecting Subtle Port Scans through Characteristics based Interactive Visualization Weijie Wang,
Purdue UniversityBaijian Yang,
Purdue UniversityYingjieChen,
Purdue University
Using Time-Series Analysis to Provide Long-Term CPU Utilization Prediction Daniel Yoas,
Pennsylvania College of TechnologyGreg Simco,
Nova Southeastern
Three-Dimensional Wireless Heat Mapping and security Assessment using Multi-Rotor Aerial Drones Scott Pack,
Brigham Young UniversityDale Rowe,
Brigham Young University
The Critical Role of Profiles in Social E-Learning Design Lei Shi,
University of Warwick
Improving Student Success through Personalization and Customization Han Reichgelt,
Southern Polytechnic State UniversityRichard Halstead-Nussloch,
Southern Polytechnic State UniversityJon Preston,
Southern Polytechnic State University
A Methodology for Personalized Competency-based Learning in Undergraduate Courses Mihai Boicu,
George Mason UniversityIoulia Rytikova,
George Mason University
Answering the Question “Where can I work after I graduate?” Sandra Gorka,
Pennsylvania College of TechnologyJacob Miller,
Pennsylvania College of Technology
Industry Partnerships to Support Computer Science High School Teachers’ Pedagogical Content Knowledge Aleata Hubbard,
WestEdYvonne Kao, WestEd
Analysis of Mobile Malware Based on User Awareness Youngho Kim,
ETRIBill Stackpole,
RITTae Oh,
RIT
Streamlining Courses for the Web Development Concentration of an IT Bachelor Degree Program Xing Liu,
Kwantlen Polytechnic University
What is the next big thing: Fulbright’s Half-Life Theory Ron Fulbright,
USC Upstate
12:15 – 1:45 pm
Lunch Buckhead Ballroom
1:45 – 3:15 pm Paper: RIIT
Chair: Umar Ruhi, University of Ottawa
Room: Heritage A
Paper: SIGITE
Chair: Xing Liu, Kwantlen Polytechnic University
Room: Heritage B
Paper: SIGITE
Chair: Bill Paterson, Mount Royal University
Room: Heritage C
Session 5
Insider Hacking: Applying Situational Crime Prevention to a New White-Collar Crime Mark Stockman,
University of Cincinnati
A Survey of Security Vulnerabilities in Social Networking Media – The Case of Facebook Lei Li,
Southern Polytechnic State UniversityElizabeth Fokes,
Southern Polytechnic State University
A Taxonomy of Privacy – protecting Tools to Browse the World Wide Web Kelley Misata,
Purdue UniversityRaymond Hansen,
Purdue UniversityBaijian Yang,
Purdue University
Learning Within a Professional Environment: Shared Ownership of an HFOSS Project Heidi Ellis,
Western New England UniversityStoney Jackson,
Western New England UniversityGregory Hislop,
Drexel UniversityDarci Brudge,
Nassau Community CollegeLori Postner,
Nassau Community CollegeJoanmarie Diggs
Research Skills for Computer Engineering Undergraduates in Dutch Universities of Applied Sciences Mortaza S. Bargh,
Rotterdam University of Applied SciencesAnnette van Rooij-Peiman,
Rotterdam University of Applied SciencesLeo Remijn,
Rotterdam University of Applied SciencesSunil Choenni,
Rotterdam University of Applied Sciences
Meaningful Assessment Geoffrey Stoker,
USMAJean Blair,
USMAEdward Sobiesk,
USMA
Formulating Second-Order Logic Conditions in SQL Jalal Kawash,
University of Calgary
The Practical Application of LEGO® MINDSTORMS® Robotics Kits: Does it Enhance Undergraduate Computing Students’ Engagement in Learning the Java Programming Language? Ethan Tsang,
Edge Hill UniversityCollette Gavan,
Edge Hill UniversityMark Anderson,
Edge Hill University
Using Android as a Platform for Programming in the IT Curriculum Michael Halper,
NJIT
3:15 – 4:15 pm
Break and poster session Break: Heritage Pre-functionPoster session: Suwanee Room
Using Mobile Apps to Support Novice Programming Students Sonal Dekhane,
Georgia Gwinnett CollegeCynthia Johnson,
Georgia Gwinnett College
Comparing Public and Private IaaS Cloud Models Matthew LaPointe,
Michigan Technological UniversityLucas Walker,
Michigan Technological UniversityMatthew Nelson,
Michigan Technological UniversityJustin Shananaquet,
Michigan Technological UniversityXinli Wang, Michigan Tech University
Operation Java Blitz: Extracurricular Programming Workshops to Engage IT Students Evelyn Brannock,
Georgia Gwinnett CollegeNanette Napier,
Georgia Gwinnett CollegeRobert Lutz,
Georgia Gwinnett College
ACM Associate-Degree IT Curricular
Guidance
Cindy Tucker
Robert Campbell
Elizabeth Hawthorne
Cara Tang,
Portland Community College
Success Factors and Challenges for IT Capstone Projects Jack Zheng,
Southern Polytechnic State UniversityChi Zhang,Southern Polytechnic State UniversityLei Li,
Southern Polytechnic State University
4:15 – 5:45 pm RIIT: Paper
Chair: Richard Helps, Brigham Young University
Room: Heritage A
Focus Group
Room: Heritage B
Paper: SIGITE
Chair: David S. Kerven, Georgia Gwinnett College
Room: Heritage C
Session 6
SMS Notifications for Missed Calls Expanding Mobility for TDM Environments Michael Stinson,
Central Michigan UniversityJames Dupuis,
Central Michigan University
Modeling of Class Imbalance using an Empirical Approach with Spambase Dataset and Random Forest Classification Shan Suthaharan,
University of North Carolina at GreensboroKiranmayi Kotipalli,
University of North Carolina at Greensboro
Termediator II: Measuring Term Polysemy using Semantic Clustering Owen Riley,
Brigham Young UniversityJessica Richards,
Brigham Young UniversityJoseph Ekstrom,
Brigham Young UniversityKevin Tew,
Brigham Young University
Profiling for Education and Career Success Deborah Boisvert,
UMass BostonBruce Stephen,
Monster Government Solutions,Joyce Malyn-Smith,
Education Development Center, Inc.
Designing a Graduate Program in Information Security and Analytics Sathish Kumar,
Coastal Carolina University
Design of an Analytic Centric MS Degree in Information Sciences and Technologies Jai Kang,
Rochester Institute of TechnologyEdward Holden,
Rochester Institute of TechnologyQi Yu,
Rochester Institute of Technology
Implementing a Living Learning Community in Information Technology Sandra Gorka,
Pennsylvania College of TechnologyMatthew Helf, Pennsylvania College of TechnologyJacob Miller,
Pennsylvania College of Technology
Saturday, October 18, 2014
Session A B
9 – 10:30 am Workshop
Room: Heritage A
Panel
Room: Heritage C
Session 7
Guiding Students to Discover Concepts and Develop Process Skills with POGIL: Part 1 Clif Kussmaul,
Muhlenberg College
The Difficulties in Setting Up Mobile Computing Courses in Computing – a New Track for BSIT Rebecca Rutherfoord,
Southern Polytechnic State UniversityJon Preston,
Southern Polytechnic State UniversityJack Zheng,
Southern Polytechnic State UniversityMing Yang, Southern Polytechnic State University
10:40 am – 12:10 pm Workshop
Room: Heritage A
Paper: SIGITE
Chair: Jim Leone, Rochester Institute of Technology
Room: Heritage C
Session 8
Guiding Students to Discover Concepts and Develop Process Skills with POGIL: Part 2 Clif Kussmaul,
Muhlenberg College
A Profile of IT Faculty in the USA Barry Lunt,
Brigham Young UniversityWilliam Paterson,
Mount Royal University
A longitudinal examination of SIGITE conference submission data, 2007 – 2012 Randy Connolly,
Mount Royal UniversityJanet Miller,
Mount Royal UniversityRob Friedman,
Institute of Technology, UW Tacoma
Factors Affecting School Choice of Computing Students Rex Bringula,
University of the EastJohn Noel Victorino,
Ateneo de Manila University
12:15 – 1 pm
Closing session Heritage B