Keyword | Conf Year | Article | Title | Authors |
naïve Bayesian model | 2008 | View | Myth busting: Using Data Mining to Refute Link between Transfer Students and Retention Risk |
McAleer, Szakas
|
Natural language plagiarism | 2008 | View | Software Plagiarism in Undergraduate Programming Classes |
Abraham, Milligan
|
NCC | 2010 | View | BI GIS Competition Brings DSS to AITP NCC |
Hayen
|
Need for Achievement | 2010 | View | What Predicts Student Success in |
Harris, Harris, Lambert
|
nesting functions | 2014 | View | Decomposition and Reconstruction of Complex Spreadsheet Functions |
Tastle, St. Clair, Cullar-Ledford
|
Net Generation | 2012 | View | "Consumerization of IT" - Challenges for IS Education |
Law
|
Net Generation | 2011 | View | An Expanded Study of Net Generation Perceptions on Privacy and Security on Social Networking Sites (SNS) |
Molluzzo, Lawler, Doshi
|
Net Generation | 2011 | View | Facing the Challenges of IS Education for the Net Generation |
Law
|
NetApp Academic Alliance | 2012 | View | Costs and Benefits of Vendor Sponsored Learning Materials in Information Technology Education |
Hua
|
network | 2010 | View | Creating and Using a Computer Networking and Systems Administration Laboratory Built Under Relaxed Financial Constraints |
Conlon, Mullins
|
network | 2010 | View | Developing Information Systems Education in a Network – Lessons Learned from a R&D Project |
Melin, Axelsson
|
Network Access | 2013 | View | A Study of E-Readiness Assessment: The Case of Three Universities in Nigeria |
Eweni, Meyinsse, Mbarika, Okpechi
|
network engineer | 2011 | View | Preparing for a Career as a Network Engineer |
Morris, Fustos, Haga
|
Network security | 2008 | View | Developing the Cyber Defenders of Tomorrow with Regional Collegiate Cyber Defense Competitions (CCDC) |
Carlin, Manson, Zhu
|
Network Sniffing | 2013 | View | An Active Learning Activity for an IT Ethics Course |
Woods, Howard
|
Network Virtualization | 2014 | View | Software-defined Networking (SDN): Network Virtualization in the IS Curriculum |
Laverty, Turchek, Wood
|
Networking | 2011 | View | Designing an Introductory CIS Course to Attract |
Soe, Guthrie, Yakura, Hwang
|
Networks | 2014 | View | Empowering Freshmen with Technology Skills: Wireless Routers |
VanderClock
|
new venture | 2009 | View | Creating E-commerce Start-ups with Information Systems Students: Lessons Learned from New Venture Successes and Failures |
Abrahams
|
Nigerian information security | 2009 | View | Critical Analysis of Mobile Computing Security and Safety Measures: Familiarity versus Actual Practice on Mobile Devices |
Lomo-David, Lester
|
Non-Beginner programmer | 2014 | View | Teaching Non-Beginner Programmers with App Inventor: Survey Results and Implications |
Soares, Martin
|
Non-Beginners | 2013 | View | Reflections on Teaching App Inventor for Non-Beginner Programmers: Issues, Challenges and Opportunities |
Soares
|
non-Information Systems majors | 2009 | View | Computer Literacy and Non-IS majors |
Thomas, Blackwood
|
non-profit organizations | 2012 | View | Lessons Learned From A Decade Of Using Community-Based Non-Profit Organizations In Information Systems Capstone Projects |
Leidig, Lange
|
non-profit organizations | 2008 | View | Expanding Flexible Models of Service Learning in Information Systems Curricula |
Lawler
|
Non-traditional Higher Education | 2009 | View | The Integrated Technology Assessment: A Portfolio-Based Capstone Experience |
Shih, LeClair, Varden
|
Normalization | 2013 | View | From Database Concepts to Application: |
Kreie, Ernst
|
Normalization | 2012 | View | Comparing Top-down with Bottom-up Approaches: |
Kung, Kung, Gardiner
|
Normalization | 2010 | View | Sovling Relational Database Problems with ORDBMS in an Advanced Database Course |
Wang
|
note taking | 2014 | View | Evaluating the Effectiveness of Self-Created Student Screencasts as a Tool to Increase Student Learning Outcomes in a Hands-On Computer Programming Course |
Powell, Wimmer
|
NSF | 2009 | View | Tracking Women and Minorities as They Attain Degrees in Computing and Related Fields |
Sorkin, Gore, Mento, Stanton
|
NSF scholarships | 2008 | View | Piltdown Man or Inconvenient Truth? A Two-year Study of Student Perceptions about Computing |
Battig
|
Number Database | 2010 | View | The Impact of Mobile Number Portability on TUT students On-line Connectivity |
Odunaike
|