Search by Authors - EDSIGCon Proceedings

Please note the manuscripts 2015 and afer reflect EDSIGcon Proceedings which were published by ISCAP (Information Systems and Computing Academic Professionals)

Search returned 63 items for : R


Conf YearArticleTitleAuthors
2017View“Hour of Code”: A Case Study Du, Wimmer, Rada
2018ViewSoftware Concepts Emphasized In Introductory Programming Textbooks McMaster, Rague, Sambasivam, Wolthuis
2017ViewA Comparison of Key Concepts in Data Analytics and Data Science McMaster, Wolthuis, Rague, Sambasivam
2016ViewJava vs. Python Coverage of Introductory Programming Concepts: A Textbook Analysis McMaster, Sambasivam, Rague, Wolthuis
2023ViewTeaching DevOps Security Education with Hands-on Labware: Automated Detection of Security Weakness in Python Akter , Rodriguez-Cardenas, Rahman, Wu, Rahman , Shahriar
2023ViewTeaching DevOps Security Education with Hands-on Labware: Automated Detection of Security Weakness in Python Akter , Rodriguez-Cardenas, Rahman, Wu, Rahman , Shahriar
2023ViewCybersecurity the Future of Non-Profit Rural Organizations: A Pilot Study Sharma , Breese, Ramljak
2017ViewA System Architecture for Anonymity of Student Opinion Surveys Ardalan, Ardalan, Rao, Alexander
2022ViewA University’s Computing Excellence Scholarship: Chronicling the Journey’s First Year Terwilliger, Zhang, Ray, Herath
2020ViewInvestigating Student Behavior in an Interdisciplinary Computing Capstone Course Watson, Besmer, Banks, Ray, Derksen
2023ViewThe Design of Complementary Information Security and Cybersecurity Courses Ream III, Yates
2023ViewData Analytics Position Description Analysis: Skills Review and Implications for Data Analytics Curricula Booker, Rebman Jr., Wimmer, Levkoff, Powell, Breese
2023ViewNetwork Intrusion Detection system with Machine learning Intrusion Detection System with Machine Learning As a Service Kangethe , Wimmer, Rebman Jr.
2023ViewUsing Textual Analytics to Process Information Overload of Cyber Security Subreddits Omakwu , Wimmer, Rebman Jr.
2022ViewAn Industry Survey of Analytics Spreadsheet Tools Adoption: Microsoft Excel vs Google Sheets Rebman Jr., Booker, Wimmer, Levkoff, McMurtrey, Powell
2020ViewPandemic Shift: Impact of COVID-19 on IS/Microsoft Office Specialist Excel Certification Exam Classes: Remote Testing and Lessons Learned Rebman Jr., White, Booker, Wimmer, Powell
2018ViewA Nationwide Exploratory Study on Faculty Opinions on Student Preparation, Performance, and Evaluations Rebman Jr., Wimmer, Booker
2017ViewBuilding Excel Expertise: A Guide in Best Practices Tastle, Mead, Rebman Jr., Marks, Phillips
2022ViewMeasuring Learners’ Cognitive Load When Engaged with an Algorithm Visualization Tool Fathi, Teresco, Regan
2016ViewAardvark Design: The Impact of IT Infrastructure on Application Development and Deployment Held, Rein, Stofel, Valentine, Havelka
2017ViewViNEL: A Virtual Networking Lab for Cyber Defense Education Reinicke, Baker, Toothman
2016ViewHow to Teach Emotional Intelligence Skills Connolly, Reinicke
2015ViewHow secure is education in Information Technology? A method for evaluating security education in IT Grover, Reinicke, Cummings
2022ViewIS2020 Model Curriculum: Understanding the Curricular Gaps for ACBSP Accredited Programs Podeschi, Reynolds, Voss
2021ViewMWC3: An example of an Intercollegiate Regional Computing Conference Reynolds, Fleenor
2018ViewEffective Internships: A Study Combining Curriculum Development, Student Performance, and Program Assessment Reynolds, Ferguson, Leidig, Hornik
2017ViewBe Careful What You Wish For: The Continued Limiting of Computing Majors Reynolds, Ferguson, Linville
2016ViewProgramming in the IS Curriculum: Are Requirements Changing for the Right Reason? Reynolds, Adams, Ferguson, Leidig
2016ViewThe Personality of a Computing Major: Reynolds, Adams, Ferguson, Leidig
2015ViewA Tale of Two Curricula: The Case for Reynolds, Ferguson, Leidig
2015ViewExpanding Participation in Computing: Leidig, Ferguson, Reynolds
2020ViewPlugin-based Tool for Secure Mobile Application Development Shahriar, Zhang, Valero, Sneha, Riad, Islam, Ahamed
2023ViewPragmatic Due Diligence - in the World of AI Rice
2022ViewExploring The Strategies Collegiate Cybersecurity Instructors Need To Maximize Engagement Of Generation Z Cybersecurity Learners Sambasivam, Rice
2015ViewA Comparison Study in Open Source Learning Management Software Lester, Rice
2015ViewDeveloping Project Based Learning, Integrated Courses from Two Different Colleges at an Institution of Higher Education: An Overview of the Processes, Challenges, and Lessons Learned Rice, Lester
2023ViewAn Introduction to Intelligent Process Automation Mentzer, Richards
2022ViewEnhancing Learning in Business Education Fullick-Jagiela, Kelly, Paros, Awudu, Riello
2015ViewSalient Beliefs in Majoring in Management Information Systems: An Elicitation Study Chipidza, Green, Riemenschneider
2019ViewAre Professional Science Master’s (PSM) Programs Beneficial for Graduates? An Evaluation of PSM Programs Rivenbark, Cummings, Kline, Patterson
2017ViewMobile Forensics Hands-On Workshop Fryling, Rivituso
2015ViewTeaching Information Systems Courses in China: Challenges, Opportunities, and Lessons for US Educators Fryling, Rivituso
2015ViewStudent Success - Interweaving Skills for Success in Computer Introductory Courses Hashemi, Robbins
2023ViewTruth or Media: Fallacies of Perceived Cyber Attribution Abegaz, Payne, Robertson
2023ViewTeaching DevOps Security Education with Hands-on Labware: Automated Detection of Security Weakness in Python Akter , Rodriguez-Cardenas, Rahman, Wu, Rahman , Shahriar
2023ViewData-Driven Curriculum Design: Aligning Job Market Needs and Educational Content through Job Ad Analytics Müller, Felby, Bille, Mathiasen, Roesen, Nielsen
2023ViewInvestigating How Technical Acumen and Student Grit Affect the Performance of Students in Online Learning Environments Johnson, Brown, Kelly, Romero
2016ViewCase Study: Water Level Detection System Scott, Rosen
2022ViewUsing GitLab for Education program for a collaborative Cyber Infrastructure among Cybersecurity educators, learners, and researchers across the Pennsylvania State University Commonwealth Campuses Landmesser, Breese, Roshanaei, Gardner
2016ViewTeaching an Old Dog New Tricks: Rossmiller, Lawrence, Clouse, Looney
2023ViewEducating the Next Generation of CSOs: An Exercise in Conversational Role Play with ChatGPT Mitra, Schwieger, Roy
2015ViewStrategies and Approaches for Teaching Storage and Data Management – Faculty Perspectives, Insights & Suggestions Conway, Kline, Pickard, Royster, Woods, Zullo
2017ViewUniversity Micro-Credentials and the Need for Agile IS Skill Development Programs Rubleske, Cata
2023ViewFostering Student Identities in Introduction to Programming Schmalz, Connolly, Rush
2023ViewNavigating PMI’s New Body of Knowledge in IS Project Management Rush, Connolly
2022ViewWhat needs updated and when? Project Management Education Implications of the Seventh Edition PMBOK Update Rush
2021ViewAn Agile Framework for Teaching with Scrum in the IT Project Management Classroom ** Best JISE Paper (2020) Rush, Connolly
2019ViewEmotional Intelligence and Alpha Skills for IT Project Management Connolly, Rush
2018ViewCooperative Learning Activities for Introduction to MIS Connolly, Rush
2015ViewKeep I.T. SIMple! How to Make Teaching Easy and Student Learning Limitless (yes, it’s possible!) Broadway, Russell
2018ViewPrinciples of Program Revision for Computing Degrees: A Data-Driven 360 Degree Program Review Model Peltsverger, Li, Rutherfoord
2021ViewUse of Artificial Intelligence to Grade Student Discussion Boards: An Exploratory Case Study Rutner, Scott
2019ViewUsing an Ocean Shipping Game to Teach Transportation Fundamentals to Supply Chain Management Students Scott, Rutner


Search by Authors - Joint ISECON Proceedings

Please note the manuscripts below reflect the 1999 to 2014 ISECON Proceedings which were published by EDSIG, the Education Special Interest Group of AITP (Association of Information Technology Professionals, Chicago, Illinois) and the Foundation for Information Technology Education (FITE).

Search returned 72 items for : R

Conf YearArticleTitleAuthors
2007ViewMethodology for Educating Information Systems Students on the New Paradigm of Service-Oriented Architecture (SOA) Technology Lawler, Howell-Barber, Raggad
2008ViewThree Software Development Gestalts McMaster, Rague, Hadfield, Anderson
2008ViewTwo Frameworks for Discrete Mathematics McMaster, Rague, Hadfield
2007ViewTwo Gestalts for Mathematics: Logical vs. Computational McMaster, Rague, McMaster, Blake
2010ViewAddress Matching: An Expert System and Decision Support Application for GIS Wu, Rathswohl
2010ViewVisualizing Opportunities: GIS Skills for Retail Marketing Wu, Rathswohl
2006ViewInformation Quality in Customer Relationship Management Systems Bose, Hashemi, Rebhun
2014ViewExamining the challenges of using IT in Health Care Organizations. Reddy
2013ViewGamification and Creating Game Developers Redfield
2007ViewDeveloping a Distance Learning and Online Strategy: A Case Study of a Small, Private University using the Hedgehog Approach Parzinger, Redfield, Skipper, Wolff
2008ViewIntegrating Enterprise Systems Concepts in the B-School--A Regional University Perspective Hunt, Regan, Becka, Everett, Green, Hunt
2012ViewCloud Computing in Support of Applied Learning: Conn, Reichgelt
2007ViewAITP Sponsored Enhancements to the Information Systems Model Curriculum Longenecker, Leidig, McKell, Reichgelt, Russell, Waguespack, Landry, Wagner, White
2006ViewEstablishing an Assessment Process for a Computing Program Aasheim, Gowan, Reichgelt
2014ViewWhat is the Appropriate Mathematics Foundation for a Program in Computer Information Systems?"? Feinstein, Longenecker, Reif, Shresthat
2008ViewAjax Enabled Query Tool – The Capstone Experience Dollinger, Ford, Helf, Reimer
2013ViewWho Needs Certifications? A Survey of Certifications in the IT Industry Reinicke, Janicki
2012ViewImplementing an Integrated Curriculum with an Iterative Process to Support a Capstone Course in Information Systems Reinicke, Janicki, Gebauer
2011ViewSystems Analysis and Design: Know your audience Reinicke
2010ViewReal World Projects, Real World Problems: Reinicke, Janicki
2010ViewSystem Analysis of Kline, Reinicke, Peck, Porterfield, Rosen, Simmonds
2009ViewIncreasing active learning Reinicke, Janicki
2009ViewMoving Data, Moving students: Involving students in learning about Internet data traffic Reinicke, Clark
2012ViewWho, What, Where ? In Search of the Home for IS Nezlek, Dekleva, Hidding, Reithel, Waguespack
2013ViewGender Rationales and Success Factors in Assessing and Selecting a Major in Information Technology at the Undergraduate Level of a University Program: A Focus Group Approach Mishra, Draus, Caputo, Leone, Kohun, Repack
2014ViewIncluding a Programming Course in General Education: Are We Doing Enough? Ferguson, Leidig, Reynolds
2011ViewModel Curriculum "Wiki" Birds of a Feather Panel Session Lind, Hall, Chen, Leal , Babb, Pauli, Reynolds, Schwieger, Surendran, Subramanian
2010ViewStumbling Blocks in the Race to Embrace IS 2010 Nezlek, Reynolds, Russell, Tastle
2010ViewIntegrating Statistical Visualization Research into the Political Science Classroom Draper, Liu, Riesenfeld
2009ViewEvaluating Design: A Formative Evaluation of Agent Development Environments Used For Teaching Rule-Based Programming Cohen, Ritter, Haynes
2011ViewCloud Computing for Capstone Software Development Courses Roggio
2008ViewProblems with Assessing On-line and Non-Traditional Programs for Accreditation Roggio, Comer
2007ViewProcess-Driven Software Development: An Approach for the Capstone Sequence Roggio
2006ViewInserting Requirements Traceability into the Capstone Sequence Roggio
2012ViewDeveloping a Bachelor’s Program in Health Information Technology Howard, Bishop-Clark, Evans, Rose
2010ViewSystem Analysis of Kline, Reinicke, Peck, Porterfield, Rosen, Simmonds
2014ViewA panel to examine if an information systems profession can continue to exist with a 32% project success rate and continuing IS disasters such as Healthcare.gov Rosenthal, Hilton, Litttle
2014ViewThe Information Systems Profession: A Maturity Model Rosenthal, Dhariwal, Hilton
2013ViewPanel Presentation - Assessment for AACSB/ABET Schools Track White, Whitehouse, Dhariwal, Hilton, Rosenthal
2012ViewClosing the Gap: Making Decisions based on data from the ISA Exam White, Rosenthal, Hilton, McKell
2010ViewAACSB Outcomes Assessment: Rosenthal
2009ViewInformation Systems Education: What’s missing? Rosenthal
2008ViewPhysical Level Systems Design:A Methodology for Inclusion in our Systems Analysis and DesignTextbooks Rosenthal, Park
2006ViewTransaction Processing Systems: the for Physcial Design Methodology Teaching Rosenthal
2012ViewDeveloping an Undergraduate Information Systems Security Track Sharma, Murphy, Rosso, Grant
2011ViewMeasuring Assurance of Learning Goals: Murphy, Sharma, Rosso
2014ViewAssessing Critical Thinking Skills in Online and Face-to-Face Platforms for an Interdisciplinary General-Education Science Course Lester, Koether, Rowe, Gillespi
2009ViewDeveloping Oral and Written Communication Skills in Undergraduate Computer Science and Information Systems Curriculum Kortsarts, Fischbach, Rufinus, Utell, Yoon
2006ViewIntegrating Project Component into the Introductory Computer Science and Information Systems Curriculum Kortsarts, Rufinus
2014ViewReal People, Rupert
2007ViewFactors Influencing Computer Information Systems Majors whether to Join AITP Hunsinger, Russ, Knight
2014ViewA Systems Analysis and Design Case for a Business Modeling Learning Experience for a Capstone Advanced CIS/IS Systems Development Class Russell, Russell
2014ViewA Systems Analysis and Design Case for a Business Modeling Learning Experience for a Capstone Advanced CIS/IS Systems Development Class Russell, Russell
2013ViewIs Now the time to Bring Business Intelligence into the Curriculum? Tastle, Longenecker, Feinstein, Guarneri, Pierce , Russell
2012ViewFacing the Future in Technology: Little, Granger, Hidding, Kasper, Russell, Varden
2010ViewStumbling Blocks in the Race to Embrace IS 2010 Nezlek, Reynolds, Russell, Tastle
2009ViewA Study of the Programming Languages Used in Both Information Systems (CIS) and in Computer Science (CS) Curriculums Russell, Russell, Tastle, Pollacia
2009ViewA Study of the Programming Languages Used in Both Information Systems (CIS) and in Computer Science (CS) Curriculums Russell, Russell, Tastle, Pollacia
2009ViewThe Likert Scale: Russell, Chimi
2008ViewAn On-Line Multi-Disciplinary Computer Information Systems Minor: Responding to Declining Enrollments in CIS Majors: Russell, Russell, Pollacia, Mai
2008ViewAn On-Line Multi-Disciplinary Computer Information Systems Minor: Responding to Declining Enrollments in CIS Majors: Russell, Russell, Pollacia, Mai
2008ViewThe Rolling Learning Cell: Russell, Goodnight
2007ViewAITP Sponsored Enhancements to the Information Systems Model Curriculum Longenecker, Leidig, McKell, Reichgelt, Russell, Waguespack, Landry, Wagner, White
2007ViewReversing the Decline of CIS Enrollment in Colleges and Universities by Russell, Russell, Pollacia
2007ViewReversing the Decline of CIS Enrollment in Colleges and Universities by Russell, Russell, Pollacia
2006ViewA Survey Analysis of the Perceptions of Educators and IS Professionals Appertaining to the Course Content of an Undergraduate Information Systems Capstone Course Russell, Russell
2006ViewA Survey Analysis of the Perceptions of Educators and IS Professionals Appertaining to the Course Content of an Undergraduate Information Systems Capstone Course Russell, Russell
2006ViewPromptness: A Teaching and Evaluation Model Russell
2012ViewISECON 2012 Fake Paper 3 Woratschek, Babb, Sendall, Landry, Battig, Waguespack, Ryker
2010ViewAACSB Learning Goals: One-Minute Guest Speakers Help To "Close the Loop" Ryker
2010ViewTexting and the Efficacy of Mnemonics: An Exploratory Study Ryker, Viosca, Lawrence, Kleen
2007ViewSpecial Topics Courses in Information Systems: Current Uses Ryker, Fanguy, Legendre