Conf Year | Article | Title | Authors |
2020 | View | Exploring Depth in Cybersecurity Education Through the Lens of a SIEM |
MacDonald, Pike, Pike
|
2024 | View | Our Interconnected, Resilient, Modern World ... Is Still Painfully and Remarkably Vulnerable |
Witman, Mackelprang, Prior
|
2022 | View | Framework for Incorporating User Experience Design in the IS Curriculum through Community-Engaged Projects |
Bozan, Stoner, Maden
|
2019 | View | Fostering Cooperative Learning with Scrum in a Semi-Capstone Systems Analysis and Design Course
|
Magana, Seah, Thomas
|
2023 | View | Comparing Student Perceptions of Accelerated versus Regular Course Types – A Multi-Institutional Study |
Mahadevan, Etezady, Zhang
|
2025 | View | Beyond the Benchmark: Why NSSE Falls Short for Measuring Engagement in IT Students |
Wolf, Mahatanankoon
|
2021 | View | Antecedents of Computer-based Testing (CBT) Anxiety and Performance |
Lewis, Mahatanankoon, Plumadore
|
2020 | View | Cognitive Learning Strategies in an Introductory Computer Programming Course |
Mahatanankoon, Wolf
|
2019 | View | Redefining “Monozukuri” and “Hitozukuri” in the Context of Information Technology Education |
Thiptarajan, Lertrusdachakul, Mahatanankoon
|
2017 | View | Managing an NSF-Funded Information Technology Scholarship Program |
Mahatanankoon, Hunter, El-Zanati
|
2015 | View | Joule Wafer: What's the Point in Sharing |
Maiden, Meyers, Mosely, Thompson, Havelka
|
2024 | View | An Analysis of Methodologies for the Prevention and Mitigation of Cheating in Online Gaming Using Artificial Intelligence and its Ethical Impact |
Pisano, Flynn, Tischer, Mandujano
|
2016 | View | Expanding the Classroom: Twitter as a Teaching and Learning Enhancement Tool |
Mangle
|
2017 | View | Mastering Data Warehouse Maturity Concepts Using a Serious Game: Design and Implementation of Emerge2Maturity |
Khojah, Mannino
|
2018 | View | Collaborative Education: Building a Skilled Software Validation and Verification Community |
Acharya, Manohar, Wu
|
2016 | View | Active Learning Tools For Teaching Undergraduate Software Engineering |
Wu, Manohar, Acharya
|
2015 | View | Class Exercises for Active Learning in Software Verification and Validation |
Wu, Manohar, Acharya
|
2018 | View | Social Media and the Velvet Revolution in Armenia |
Odabashian, Manoukian, Witman
|
2015 | View | The Development of an Educational Cloud for IS Curriculum through a Student-Run Data Center |
Hwang, Pike, Manson
|
2025 | View | Bridging the Cybersecurity Skills Gap by Leveraging Cybersecurity Clinics: Developing the Arizona Cybersecurity Clinic |
Wagner, Honomichl, Mapp, Xu
|
2017 | View | Building Excel Expertise: A Guide in Best Practices |
Tastle, Mead, Rebman Jr., Marks, Phillips
|
2024 | View | Conquer the Cloud: Effectively Using the Amazon Web Services Academy Learner Lab for Information Systems Education |
Strain, Marquardson, Gomillion
|
2023 | View | Enhancing Self-Directed Learning with Artificial Intelligence: A Cybersecurity Classroom Study |
Marquardson
|
2021 | View | SOC It to ‘Em: Bringing a Security Operations Center onto a University Campus |
Marquardson
|
2019 | View | Encouraging Lifelong Learning through Tech Explorations |
Marquardson
|
2019 | View | Skills, Certifications, or Degrees: What Employers Demand for Entry-level Cybersecurity Jobs |
Marquardson, Elnoshokaty
|
2018 | View | Simulation for Network Education: Transferring Networking Skills Between Simulated to Physical Environments |
Marquardson, Gomillion
|
2017 | View | Cyber Security Exercise Development: Protecting Your Institution While Giving Students Experience |
Marquardson, Gomillion
|
2017 | View | Infrastructure Tools for Efficient Cybersecurity Exercises |
Marquardson
|
2023 | View | Mismatch in Academia and Industry: An Exploration of Perceived Graduate Competencies and Industry Expectations in Information Technology |
Strain, Marshall
|
2022 | View | The State of FinTech in Academia: An AACSB Survey |
Fowler, Marshall, Cardon
|
2019 | View | Adopting Competency Mindful of Professionalism in Baccalaureate Computing Curricula |
Waguespack, Topi, Frezza, Babb, Marshall, Takada, van der Veer, Pears
|
2016 | View | Student Veterans’ Shared Experience Using Social Media in Higher Education: A Pilot Study with a Hybrid Phenomenological Data Analysis Method |
Marsilio
|
2015 | View | Cyber Security Day: Creating a Mock Cyber Competition Event to Increase Student Interest in Cyber Security |
Imboden, Martin, Woodward, Wood, Goodman
|
2015 | View | Organizing an App Inventor Summer Camp for Middle School Girls: What the Experts Don’t Tell You |
Martin, Soares
|
2015 | View | Wooden Peg Game: Implementations as Both a Web App and as an Android App |
Martincic
|
2024 | View | The Impact of Continuous Learning on Service Quality and Information Quality: The Moderating Effect of System Quality |
Masialeti, Vrooman, Moon, Glascoe, Hossain, Wang
|
2016 | View | Accentra: Thrashing through ERP |
Bradds, Hills, Masters, Weiss, Havelka
|
2023 | View | Data-Driven Curriculum Design: Aligning Job Market Needs and Educational Content through Job Ad Analytics |
Müller, Felby, Bille, Mathiasen, Roesen, Nielsen
|
2021 | View | Instructional Modes for the New Normal:
In-Class, Synchronous or Asynchronous?
|
Matta, Palvia
|
2018 | View | Automated Assessment with Formative Feedback using Excel |
Frost, Matta
|
2018 | View | Partial Credit on Multiple-choice Exams: Does It Help or Hurt Students? |
Moss, Matta, Frost, Chimeli
|
2025 | View | Excessive Equating: An Exploration of Knowledge Unit (KU) Curricular Load for CAE-CD Program Design and Evaluation |
Miller, Matthews, Clark, Stoker
|
2024 | View | Gender Pronouns in Email Signatures: What Do We Think? |
Matthews, Wirth
|
2023 | View | Creating a Safety Visualization Dashboard for Construction Site Risk Analysis and Management |
Matthews, Moss
|
2021 | View | Encouraging Metacognition in Programming Courses |
Matthews
|
2023 | View | A Mixed-Method Study Exploring Student Motivation Participating in Cybersecurity CTF Competitions |
Beauchamp, Matusovich
|
2022 | View | A Mixed-Method Study of Significant Learning Experiences with Cyber Ranges in Cybersecurity Education |
Beauchamp, Matusovich
|
2017 | View | Motivating Students through Educational Software Development |
Felice, Mauco, Leonardi
|
2015 | View | Putting the Leader into Project Management |
McAleer, Szakas
|
2021 | View | A Full-stack Platform for Teaching Web Application Security
|
Li, Chou, McAllister
|
2022 | View | What Do They Know? Digital Literacy Competencies of First-Year College Students
|
McCarron, Frydenberg
|
2022 | View | Deepening Intrusion Detection Understanding via a Simple IDS Assignment |
McCarthy, Stoker
|
2018 | View | Alpha Insurance: A Predictive Analytics Case to Analyze Automobile Insurance Fraud using SAS Enterprise Miner |
McCarthy, Ceccucci, McCarthy, Halawi
|
2018 | View | Alpha Insurance: A Predictive Analytics Case to Analyze Automobile Insurance Fraud using SAS Enterprise Miner |
McCarthy, Ceccucci, McCarthy, Halawi
|
2018 | View | Building Teams with Legos |
Jones, McCarthy
|
2017 | View | Group Assignments as a Measure to Promote Performance in Virtual Teams
|
Angelo, McCarthy
|
2017 | View | Harnessing Business Analytics: Analyzing Data Analytics Programs in U.S. Business Schools |
Parks, Ceccucci, McCarthy
|
2015 | View | Agile Preparation Within a Traditional Project Management Course |
Landry, McDaniel
|
2018 | View | Dotting i’s and Crossing T’s: Integrating Breadth and Depth in an Undergraduate Cybersecurity Course |
Yates, Frydenberg, Waguespack, McDermott, OConnell, Chen, Babb
|
2024 | View | Teaching Case: A Business Intelligence Class Project Combining Business Knowledge, Critical Thinking, and Story-Telling for an Online Retail Store
|
Triche, McDiffett, Firth, Clouse
|
2025 | View | Automating Curriculum Intelligence: Scalable Extraction and Categorization of University Courses Using GenAI |
Sa-Couto, Gürpinar, Jia, Quadri, McKenna
|
2018 | View | Software Concepts Emphasized In Introductory Programming Textbooks
|
McMaster, Rague, Sambasivam, Wolthuis
|
2017 | View | A Comparison of Key Concepts in
Data Analytics and Data Science
|
McMaster, Wolthuis, Rague, Sambasivam
|
2016 | View | Java vs. Python Coverage of Introductory Programming Concepts: A Textbook Analysis |
McMaster, Sambasivam, Rague, Wolthuis
|
2020 | View | Development of a Flexible Point-based Promotion and Tenure Document in the Age of Societal Uncertainty |
Schwieger, Dickson, Johnston, McMillan, Stovall
|
2022 | View | An Industry Survey of Analytics Spreadsheet Tools Adoption: Microsoft Excel vs Google Sheets |
Rebman Jr., Wimmer, Booker, Levkoff, McMurtrey, Powell
|
2017 | View | Building Excel Expertise: A Guide in Best Practices |
Tastle, Mead, Rebman Jr., Marks, Phillips
|
2017 | View | Ethical Hacking: Educating Future
Cybersecurity Professionals
|
Hartley, Medlin, Houlik
|
2016 | View | Identifying Microsoft Excel Skills Important for Business School Graduates |
Formby, Medlin, Ellington
|
2024 | View | Phenomenological study of Generative AI in Higher Education as Perceived by Academics
|
Linden, Yuan, Mendoza
|
2019 | View | Integrative Learning and Interdisciplinary Information Systems Curriculum Development in Accounting Analytics |
Woodside, Augustine, Chambers, Mendoza
|
2023 | View | Social Media Users Only Have Two Clusters: A United States Analysis |
Peslak, Kovalchick, Menon
|
2023 | View | Using Social Network Analysis to Analyze Student Interactions in an Online Asynchronous Course |
Menon, Kovalchick, Peslak
|
2022 | View | An Investigation of the Conceptual Complexity of Exams Questions in an Introductory Programming Course |
Menon
|
2021 | View | The Role of Task Value and Online Learning Strategies in an Introductory Computer Programming Course |
Menon
|
2020 | View | An Investigation On Student Perceptions of Self-Regulated Learning In An Introductory Computer Programming Course. |
Menon
|
2019 | View | Using a Concept Map to Represent the Composition of Knowledge in an Introductory Programming Course
|
Menon, Kovalchick
|
2025 | View | Are 21st Century Skills Still Relevant in the 21st Century?
|
Frydenberg, Mentzer
|
2025 | View | From Headsets to Language Fluency: Investigating Engagement and Learning with VR in Middle School Spanish |
Loughlin, Mentzer
|
2025 | View | Teaching Data Literacy Through Operational Analytics: A Car Wash Case Study |
Mentzer, Russo, Lawshe, Mullen
|
2024 | View | Exploring VR-Enhanced Learning in Business Education: A Multi-Site Study |
Mentzer, Frydenberg, Li
|
2024 | View | The Rapid Rise of Generative AI Adoption among College Students
|
Frydenberg, Mentzer, Patterson
|
2024 | View | The Virtual Stage: Metaverse Integration in Effective Speaking Courses |
Patterson, Temple, Anderson, Rogalski, Mentzer
|
2023 | View | A Human Collaboration with ChaptGPT : Developing Case Studies with Generative AI
|
Singh, Samborowski, Mentzer
|
2023 | View | An Introduction to Intelligent Process Automation |
Mentzer, Richards
|
2023 | View | Are Tech Savvy Students Tech Literate?
Digital and Data Literacy Skills
of First-Year College Students
|
Mentzer, Frydenberg, Patterson
|
2020 | View | From Engagement to Empowerment: Project-Based Learning in Python Coding Courses
|
Frydenberg, Mentzer
|
2019 | View | Teaching Applications and Implications of Blockchain via Project-Based Learning: A Case Study |
Mentzer, Frydenberg, Yates
|
2018 | View | Teaching blockchain: Technology, applications and implications |
Yates, Mentzer
|
2022 | View | Practical Uses of DevOps in the Classroom with GitLab for Education |
Metz, Hupy
|
2024 | View | Are Students Willing to Pay More? An Exploration of Peer-to-Peer Payment App Use Among College Students |
Kim, Fantin, Metzer
|
2019 | View | Are MBA Programs Preparing Their Students for the Next Wave of Disruptive Technologies? |
Kim, Habowski, Metzer
|
2024 | View | Developing a Data Analytics Concentration for a Master of Liberal Arts Program |
Mew, Mew
|
2024 | View | Developing a Data Analytics Concentration for a Master of Liberal Arts Program |
Mew, Mew
|
2023 | View | Leveraging ChatGPT for Higher Education Course Offerings |
Mew, Money
|
2022 | View | Combining Project Based Learning and Lean Six Sigma Methodologies to Teach Robotic Process Automation Analysis and Design |
Money, Mew
|
2019 | View | Developing an Undergraduate Data Analytics Program for Non-Traditional Students |
Mew
|
2019 | View | Implementing Agile as an Instructional Methodology for Low-Code Software Development Courses |
Poe, Mew
|
2018 | View | A Case Study on Using the Mendix Low Code Platform to support a Project Management Course |
Mew, Field
|
2018 | View | Maintaining Highly Relevant MIS Capstones: Experiential Cases and Alternatives |
Mew, Money
|
2018 | View | The Course Registration App: A Low Code Development Scenario to Support Core IS Courses |
Mew, Field
|
2017 | View | IT Security Education – A Case Study in Developing an End-To-End Pathway to Success |
Mew
|
2016 | View | The Information Security Undergraduate Curriculum: Evolution of a Small Program |
Mew
|
2015 | View | Developing a Directed Information Systems Capstone to Enhance Cloud Competencies |
Mew
|
2015 | View | Information Systems Education: The Case for the Academic Cloud |
Mew
|
2015 | View | Joule Wafer: What's the Point in Sharing |
Maiden, Meyers, Mosely, Thompson, Havelka
|
2020 | View | Blockchain Technology in Peer-to-Peer eLearning: Opportunities and Challenges |
Miah
|
2016 | View | Comprehensive Relational Database Design and Development for Local Church: A Teaching Case Study |
Miah, Omar
|
2015 | View | Maximizing Reverse Selection Queries |
Miah
|
2024 | View | Importance of Soft Skills Comparative Study with Cybersecurity Professionals in the Manufacturing and Finance Critical Sectors |
Mierzwa, Lind
|
2024 | View | Utilizing a Virtual Firewall Appliance for Introducing and Reinforcing the Concepts and Implementation of Devices to Improve Security in a Computing Environment |
Mierzwa, Eng
|
2025 | View | Excessive Equating: An Exploration of Knowledge Unit (KU) Curricular Load for CAE-CD Program Design and Evaluation |
Miller, Matthews, Clark, Stoker
|
2021 | View | Debriefing an SQL Exploratory Activity to Detect Data Anomalies, Summary Statistics, and Potential Fraud Within a 100,000-Invoice Dataset |
Siggard, Dupin-Bryant, Mills, Olsen
|
2018 | View | The Emergence of Business Analytics in Information Systems from 2011-2018 |
Chudoba, Mills, Fadel
|
2023 | View | Insights for the next viral outbreak: An information systems applied research based on lessons from COVID-19 |
D'Souza, Mishra
|
2023 | View | What’s in a name? Student preferences for cybersecurity-related major titles
|
Draus, Mishra, Slonka, Bromall
|
2021 | View | IT Skills Gap: A Survey Of Employers’ Requirements In 4 Key Domains |
Draus, Mishra, Slonka, Bromall
|
2019 | View | Student Perceptions of Challenges and Role of Mentorship in Cybersecurity Careers: Addressing the Gender Gap |
Pinchot, Cellante, Mishra, Paullet
|
2016 | View | How to Encourage Middle School Girls Interested in STEM+C Education: An Assessment of Current Status |
Mishra, Cellante, Igoche
|
2016 | View | Mobile Forensics and Security Certificate: An Addition to a Cyber Security Degree |
Paullet, Pinchot, Mishra
|
2015 | View | Redesigning the Traditional Introductory Computer Course: A Pretest/Posttest Analysis |
Mishra, Cellante, Igoche, Kavanaugh
|
2025 | View | Cyber Pass – A Cyber Security Personality Assessment for Organizations |
Reinicke, Mislan, Blom
|
2024 | View | Countering the “Plagiarism Slot Machine”: Protecting Creators and Businesses from AI Copyright Infringement
|
Ladwig, Schwieger, Mitra
|
2023 | View | Educating the Next Generation of CSOs: An Exercise in Conversational Role Play with ChatGPT |
Mitra, Schwieger, Roy
|
2023 | View | Gamifying a Database Management and Design Final Exam by adding a
Choose-Your-Own-Adventure Twist
|
Strain, Mitra
|
2022 | View | Managing Graduate Student Advisement Questions during a Season of Explosive Growth: Development and Testing of an Advising Chatbot |
Mitra, Schwieger, Lowe
|
2015 | View | A Conceptual Metaphor Based Model for Enhanced Understanding of Programming Concepts |
Moape, Ojo, Lall
|
2019 | View | Title IX mandate to report non-consensual sexual contact: An application of text data analytics to understand the views of university freshmen |
Modaresnezhad, Canel
|
2018 | View | The Soul of the Introductory Information Systems Course
|
Modaresnezhad, Schell
|
2023 | View | Examining Factors Influencing the Acceptance of Big Data Analytics in Healthcare
|
Mohammed, Lind
|
2015 | View | A Perception Study of Bullying Prevalence in the Information Systems Profession |
Molluzzo, Lawler
|
2015 | View | A Real-World-Projects Capstone Course in Computing: A 15-year Experience |
Tappert, Cotoranu, Monaco
|
2024 | View | A Proposed Study of Factors Moderating Degree of Trust in LLM and ChatGPT-like Outputs |
Money, Thanetsunthorn
|
2023 | View | Leveraging ChatGPT for Higher Education Course Offerings |
Mew, Money
|
2022 | View | Combining Project Based Learning and Lean Six Sigma Methodologies to Teach Robotic Process Automation Analysis and Design |
Money, Mew
|
2018 | View | Maintaining Highly Relevant MIS Capstones: Experiential Cases and Alternatives |
Mew, Money
|
2024 | View | The Impact of Continuous Learning on Service Quality and Information Quality: The Moderating Effect of System Quality |
Masialeti, Vrooman, Moon, Glascoe, Hossain, Wang
|
2021 | View | Managing Change in MIS Courses: Building Evergreen Learning Tools Together |
Sylvester, Morris, Karampelas
|
2017 | View | Connecting the Dots and Nodes:
A Survey of Skills Requested by Employers for Network Administrators
|
Morris, Fustos, Haga
|
2015 | View | Joule Wafer: What's the Point in Sharing |
Maiden, Meyers, Mosely, Thompson, Havelka
|
2025 | View | Student Achievement Wallet - Loaded with Skills and Credentials for Career Pathways and Jobs |
Janicki, Moskal
|
2024 | View | Connecting Students to Careers and Jobs - Learning and Employment Record Infrastructure |
Moskal
|
2024 | View | How to Implement a Digital Achievement Wallet for your Students |
Moskal
|
2023 | View | Creating a Safety Visualization Dashboard for Construction Site Risk Analysis and Management |
Matthews, Moss
|
2018 | View | Partial Credit on Multiple-choice Exams: Does It Help or Hurt Students? |
Moss, Matta, Frost, Chimeli
|
2018 | View | Process-Focused Approach to a Systems Analysis & Design Group Project |
Mukherjee, Bleakney
|
2025 | View | Teaching Data Literacy Through Operational Analytics: A Car Wash Case Study |
Mentzer, Russo, Lawshe, Mullen
|
2023 | View | Bridging the Practice-Research Gap through Student Research: Learning to Become an IS Community of Practice Member |
Müller
|
2023 | View | Data-Driven Curriculum Design: Aligning Job Market Needs and Educational Content through Job Ad Analytics |
Müller, Felby, Bille, Mathiasen, Roesen, Nielsen
|
2021 | View | Digital Badges as an Agile Pathway: Implementing Graduate-Level, Micro-Credential Programs to Reskill the IT Workforce |
Ermicioi, Liu, Murphy
|
2020 | View | “BILT for Success”: An Alternative Education Strategy to Reskill the Business and Technology Professionals for a Sustainable Future |
Liu, Murphy
|
2019 | View | An Assignment a Day Scaffolded Learning Approach for Teaching Introductory Computer Programming |
Dawar, Murphy
|
2019 | View | Developing an Electronic Resume Analyzer Portal (e-RAP): A Natural Language Processing Approach to Enhance College Graduates Job Readiness |
Green, Liu, Murphy
|
2025 | View | Birds of a Feather |
Connolly, Mutchler
|
2024 | View | Birds of a Feather |
Connolly, Mutchler
|
2023 | View | An Exploration of Student ChatGPT Use in Higher-Education |
Lough, Mutchler
|
2022 | View | Birds of a Feather - Find a Research Partner |
Connolly, Mutchler
|
2022 | View | Exploring the Concept of Cheating as Influenced by a Global Pandemic |
Lough, Mutchler
|
2021 | View | Building a Scalable, Platform-Agnostic Relational Database Module for Introduction to MIS |
Mutchler, Lough, Connolly
|
2020 | View | How to Apply an Agile Framework to InfoSec Management |
Mutchler, Connolly
|