Search by Authors - EDSIGCon Proceedings

Please note the manuscripts 2015 and afer reflect EDSIGcon Proceedings which were published by ISCAP (Information Systems and Computing Academic Professionals)

Search returned 81 items for : M


Conf YearArticleTitleAuthors
2020ViewExploring Depth in Cybersecurity Education Through the Lens of a SIEM MacDonald, Pike, Pike
2019ViewFostering Cooperative Learning with Scrum in a Semi-Capstone Systems Analysis and Design Course Magana, Seah, Thomas
2020ViewCognitive Learning Strategies in an Introductory Computer Programming Course Mahatanankoon, Wolf
2019ViewRedefining “Monozukuri” and “Hitozukuri” in the Context of Information Technology Education Thiptarajan, Lertrusdachakul, Mahatanankoon
2017ViewManaging an NSF-Funded Information Technology Scholarship Program Mahatanankoon, Hunter, El-Zanati
2015ViewJoule Wafer: What's the Point in Sharing Maiden, Meyers, Mosely, Thompson, Havelka
2017ViewMastering Data Warehouse Maturity Concepts Using a Serious Game: Design and Implementation of Emerge2Maturity Khojah, Mannino
2018ViewCollaborative Education: Building a Skilled Software Validation and Verification Community Acharya, Manohar, Wu
2016ViewActive Learning Tools For Teaching Undergraduate Software Engineering Wu, Manohar, Acharya
2015ViewClass Exercises for Active Learning in Software Verification and Validation Wu, Manohar, Acharya
2018ViewSocial Media and the Velvet Revolution in Armenia Odabashian, Manoukian, Witman
2015ViewThe Development of an Educational Cloud for IS Curriculum through a Student-Run Data Center Hwang, Pike, Manson
2017ViewBuilding Excel Expertise: A Guide in Best Practices Tastle, Mead, Rebman, Marks, Phillips
2019ViewEncouraging Lifelong Learning through Tech Explorations Marquardson
2019ViewSkills, Certifications, or Degrees: What Employers Demand for Entry-level Cybersecurity Jobs Marquardson, Elnoshokaty
2018ViewSimulation for Network Education: Transferring Networking Skills Between Simulated to Physical Environments Marquardson, Gomillion
2017ViewCyber Security Exercise Development: Protecting Your Institution While Giving Students Experience Marquardson, Gomillion
2017ViewInfrastructure Tools for Efficient Cybersecurity Exercises Marquardson
2019ViewAdopting Competency Mindful of Professionalism in Baccalaureate Computing Curricula Waguespack, Topi, Frezza, Babb, Marshall, Takada, van der Veer, Pears
2016ViewStudent Veterans’ Shared Experience Using Social Media in Higher Education: A Pilot Study with a Hybrid Phenomenological Data Analysis Method Marsilio
2015ViewCyber Security Day: Creating a Mock Cyber Competition Event to Increase Student Interest in Cyber Security Imboden, Martin, Woodward, Wood, Goodman
2015ViewOrganizing an App Inventor Summer Camp for Middle School Girls: What the Experts Don’t Tell You Martin, Soares
2015ViewWooden Peg Game: Implementations as Both a Web App and as an Android App Martincic
2016ViewAccentra: Thrashing through ERP Bradds, Hills, Masters, Weiss, Havelka
2018ViewAutomated Assessment with Formative Feedback using Excel Frost, Matta
2018ViewPartial Credit on Multiple-choice Exams: Does It Help or Hurt Students? Moss, Matta, Frost, Chimeli
2017ViewMotivating Students through Educational Software Development Felice, Mauco, Leonardi
2015ViewPutting the Leader into Project Management McAleer, Szakas
2018ViewAlpha Insurance: A Predictive Analytics Case to Analyze Automobile Insurance Fraud using SAS Enterprise Miner McCarthy, Ceccucci, McCarthy, Halawi
2018ViewAlpha Insurance: A Predictive Analytics Case to Analyze Automobile Insurance Fraud using SAS Enterprise Miner McCarthy, Ceccucci, McCarthy, Halawi
2018ViewBuilding Teams with Legos Jones, McCarthy
2017ViewGroup Assignments as a Measure to Promote Performance in Virtual Teams Angelo, McCarthy
2017ViewHarnessing Business Analytics: Analyzing Data Analytics Programs in U.S. Business Schools Parks, Ceccucci, McCarthy
2015ViewAgile Preparation Within a Traditional Project Management Course Landry, McDaniel
2018ViewDotting i’s and Crossing T’s: Integrating Breadth and Depth in an Undergraduate Cybersecurity Course Yates, Frydenberg, Waguespack, McDermott, OConnell, Chen, Babb
2018ViewSoftware Concepts Emphasized In Introductory Programming Textbooks McMaster, Rague, Sambasivam, Wolthuis
2017ViewA Comparison of Key Concepts in Data Analytics and Data Science McMaster, Wolthuis, Rague, Sambasivam
2016ViewJava vs. Python Coverage of Introductory Programming Concepts: A Textbook Analysis McMaster, Sambasivam, Rague, Wolthuis
2020ViewDevelopment of a Flexible Point-based Promotion and Tenure Document in the Age of Societal Uncertainty Schwieger, Dickson, Johnston, McMillan, Stovall
2017ViewBuilding Excel Expertise: A Guide in Best Practices Tastle, Mead, Rebman, Marks, Phillips
2017ViewEthical Hacking: Educating Future Cybersecurity Professionals Hartley, Medlin, Houlik
2016ViewIdentifying Microsoft Excel Skills Important for Business School Graduates Formby, Medlin, Ellington
2019ViewIntegrative Learning and Interdisciplinary Information Systems Curriculum Development in Accounting Analytics Woodside, Augustine, Chambers, Mendoza
2020ViewAn Investigation On Student Perceptions of Self-Regulated Learning In An Introductory Computer Programming Course. Menon
2019ViewUsing a Concept Map to Represent the Composition of Knowledge in an Introductory Programming Course Menon, Kovalchick
2020ViewFrom Engagement to Empowerment: Project-Based Learning in Python Coding Courses Frydenberg, Mentzer
2019ViewTeaching Applications and Implications of Blockchain via Project-Based Learning: A Case Study Mentzer, Frydenberg, Yates
2018ViewTeaching blockchain: Technology, applications and implications Yates, Mentzer
2019ViewAre MBA Programs Preparing Their Students for the Next Wave of Disruptive Technologies? Kim, Habowski, Metzer
2019ViewDeveloping an Undergraduate Data Analytics Program for Non-Traditional Students Mew
2019ViewImplementing Agile as an Instructional Methodology for Low-Code Software Development Courses Poe, Mew
2018ViewA Case Study on Using the Mendix Low Code Platform to support a Project Management Course Mew, Field
2018ViewMaintaining Highly Relevant MIS Capstones: Experiential Cases and Alternatives Mew, Money
2018ViewThe Course Registration App: A Low Code Development Scenario to Support Core IS Courses Mew, Field
2017ViewIT Security Education – A Case Study in Developing an End-To-End Pathway to Success Mew
2016ViewThe Information Security Undergraduate Curriculum: Evolution of a Small Program Mew
2015ViewDeveloping a Directed Information Systems Capstone to Enhance Cloud Competencies Mew
2015ViewInformation Systems Education: The Case for the Academic Cloud Mew
2015ViewJoule Wafer: What's the Point in Sharing Maiden, Meyers, Mosely, Thompson, Havelka
2020ViewBlockchain Technology in Peer-to-Peer eLearning: Opportunities and Challenges Miah
2016ViewComprehensive Relational Database Design and Development for Local Church: A Teaching Case Study Miah, Omar
2015ViewMaximizing Reverse Selection Queries Miah
2018ViewThe Emergence of Business Analytics in Information Systems from 2011-2018 Chudoba, Mills, Fadel
2019ViewStudent Perceptions of Challenges and Role of Mentorship in Cybersecurity Careers: Addressing the Gender Gap Pinchot, Cellante, Mishra, Paullet
2016ViewHow to Encourage Middle School Girls Interested in STEM+C Education: An Assessment of Current Status Mishra, Cellante, Igoche
2016ViewMobile Forensics and Security Certificate: An Addition to a Cyber Security Degree Paullet, Pinchot, Mishra
2015ViewRedesigning the Traditional Introductory Computer Course: A Pretest/Posttest Analysis Mishra, Cellante, Igoche, Kavanaugh
2015ViewA Conceptual Metaphor Based Model for Enhanced Understanding of Programming Concepts Moape, Ojo, Lall
2019ViewTitle IX mandate to report non-consensual sexual contact: An application of text data analytics to understand the views of university freshmen Modaresnezhad, Canel
2018ViewThe Soul of the Introductory Information Systems Course Modaresnezhad, Schell
2015ViewA Perception Study of Bullying Prevalence in the Information Systems Profession Molluzzo, Lawler
2015ViewA Real-World-Projects Capstone Course in Computing: A 15-year Experience Tappert, Cotoranu, Monaco
2018ViewMaintaining Highly Relevant MIS Capstones: Experiential Cases and Alternatives Mew, Money
2017ViewConnecting the Dots and Nodes: A Survey of Skills Requested by Employers for Network Administrators Morris, Fustos, Haga
2015ViewJoule Wafer: What's the Point in Sharing Maiden, Meyers, Mosely, Thompson, Havelka
2018ViewPartial Credit on Multiple-choice Exams: Does It Help or Hurt Students? Moss, Matta, Frost, Chimeli
2018ViewProcess-Focused Approach to a Systems Analysis & Design Group Project Mukherjee, Bleakney
2020View“BILT for Success”: An Alternative Education Strategy to Reskill the Business and Technology Professionals for a Sustainable Future Liu, Murphy
2019ViewAn Assignment a Day Scaffolded Learning Approach for Teaching Introductory Computer Programming Dawar, Murphy
2019ViewDeveloping an Electronic Resume Analyzer Portal (e-RAP): A Natural Language Processing Approach to Enhance College Graduates Job Readiness Green, Liu, Murphy
2020ViewHow to Apply an Agile Framework to InfoSec Management Mutchler, Connolly


Search by Authors - Joint ISECON Proceedings

Please note the manuscripts below reflect the 1999 to 2014 ISECON Proceedings which were published by EDSIG, the Education Special Interest Group of AITP (Association of Information Technology Professionals, Chicago, Illinois) and the Foundation for Information Technology Education (FITE).

Search returned 174 items for : M

Conf YearArticleTitleAuthors
2014ViewThe Information Systems Core: A Study from the Perspective of IS Core Curricula in the U.S. Hwang, Ma, Wang
2014ViewThe Landscape of Healthcare Informatics Programs in the United States: an Updated Survey MacKellar
2008ViewAn On-Line Multi-Disciplinary Computer Information Systems Minor: Responding to Declining Enrollments in CIS Majors: Russell, Russell, Pollacia, Mai
2010ViewAn Analysis of the Ethics of Data Warehousing in the Context of Social Networking Applications and Adolescents Louch, Mainier, Frketich
2012ViewThe Effects of Contemporary Technologies on Medical Education, Practice, and Management Nezlek, Luba, Maino, Friedman
2007ViewIntroduction to Computer Forensics: what is it and how does it mesh with Computer Science? Malinowski
2006ViewCapstone Projects: Putting the Pieces Together Malinowski, Noble
2013ViewCan Web 2.0 Tools Still Provide a Means for Effective Communication and Collaboration? Kim, Breese-Vitelli, Homan, Maloney
2014ViewBusiness Analytics in Practice and in Education: A Competency-based Perspective Mamonov, Misra, Jain
2010ViewVirtualization: Providing Better Computing to Universities Chawdhry, Mance
2012ViewA Comprehensive Survey on Cyberbullying Perceptions at a Major Metropolitan University – Faculty Perspectives Molluzzo, Lawler, Manneh
2008ViewDeveloping the Cyber Defenders of Tomorrow with Regional Collegiate Cyber Defense Competitions (CCDC) Carlin, Manson, Zhu
2007ViewFive Years of Success: Some Outcomes of the Carnegie Mellon Information Assurance Capacity Building Program Sledge, Manson, Berta, Tsamitis
2012ViewCommon Access Control Terminology Used in Marchant
2012ViewSecurity Engineering Lessons Learned for Migrating Independent LANs to an Enterprise Environment Marchant, Bonneau
2007ViewAnswering the Need for Information Assurance Graduates: A Case Study of Pennsylvania State University’s Security and Risk Analysis Major Marchant, Cole, Chu
2006ViewUML 2 Academic Course – Methodological Background and Survey Benchmarking Wrycza, Marcinkowski
2007ViewSecurity Practices of Students Morgan, Lorents, Maris
2013ViewApplication of Lean Management Techniques in Support of Improved Online Learning: A Baseline Study of Deterministic Factors Related to Instructional Design and Course Development Efficacy Markham, Conn
2011ViewGet your IS students engaged, prepared and ready to succeed with CourseMate! Chepelsky, Marsh
2014ViewIT0: Discrete Math and Programming Logic Topics as a Hybrid Alternative to CS0 Martin
2014ViewTeaching Non-Beginner Programmers with App Inventor: Survey Results and Implications Soares, Martin
2012ViewBuilding a Cybersecurity Workforce with Remote Labs Martin, Woodward
2012ViewReassessing the Skills Required of Graduates of an Information Systems Program: Legier, Woodward, Martin
2012ViewTeaching Introductory Visual Basic Using Matthews, Martin, Kline
2011ViewNew approaches to student engagement in the Intro IS/MIS course. Lang Golub, Martin
2011ViewTeaching Introductory Visual Basic Using MS Team Foundation Server Kline, Martin, Matthews, Janicki, Guinn
2011ViewWill They or Won’t They? Exploring Ethical Martin, Woodward
2010ViewExpansion and Validation of the PAPA Framework Woodward, Martin, Imboden
2011ViewWill Computer Engineer Barbie® impact young women’s career choices? Martincic, Bhatnagar
2007ViewCombining Real-World Internships with Software Development Courses Martincic
2009ViewIntroducing Good Design Principles in an early System Engineering Course Pereira, Martinez, Felice, Meliendrez
2006ViewTeaching Effectiveness in Information Systems Courses Mashaw
2011ViewEnterprise Architecture – An Analysis of IS 2010’s Newest Core Course Schell, Mathieu
2011ViewIS 2010 & ABET Accreditation: Perspectives and Issues on the Current Iteration Saulnier, Kasper, Mathieu, Murray, White
2008ViewIntroductory Course Improves Retention, Especially for Women Mathis
2010ViewExploring Impact of Self-selected Student Teams and Academic Potential on Satisfaction Matta, Luce, Ciavarro
2012ViewTeaching Introductory Visual Basic Using Matthews, Martin, Kline
2011ViewTeaching Introductory Visual Basic Using MS Team Foundation Server Kline, Martin, Matthews, Janicki, Guinn
2013ViewEducational Software for First Order Logic Semantics in Introductory Logic Courses Mauco, Ferrante, Felice
2009ViewClausula: A Didactic Tool to Teach First Order Logic Mauco, Ferrante
2010ViewBeyond Introductory Programming: Success Factors for Advanced Programming Hoskey, Maurino
2008ViewWriting to Learn and Writing in the Disciplines: Enhancing Computer and Technical Classes Maurino
2007ViewTechnical Classes Online: A Different Breed of Learning? Maurino, Federman, Greenwald
2007ViewChanges in the Systems Analysist Skill set: 2006 versus 2001 Haga, Morris, Mawhinney, Morrell
2013ViewA Study of E-Readiness Assessment: The Case of Three Universities in Nigeria Eweni, Meyinsse, Mbarika, Okpechi
2014ViewInternet Addiction Risk in the Academic Environment Ellis, McAleer, Szakas
2013ViewInterdisciplinary IT: An Expanded Approach Fahy, McAleer, Precourt, Szakas
2010ViewLessons of Technical Disasters and Project Management McAleer, Szakas
2009ViewAccounting for Systems Analysts in the 21st Century Giordano, McAleer, Szakas
2008ViewMyth busting: Using Data Mining to Refute Link between Transfer Students and Retention Risk McAleer, Szakas
2007ViewForces for Change in the New IS 20xx Curriculum McAleer, Szakas
2006ViewCutting to the Core: Curriculum Strategies to Address Outsourcing McAleer, Szakas
2013ViewStudents Perception of Social Media as a Course Tool McCarthy, McCarthy
2013ViewStudents Perception of Social Media as a Course Tool McCarthy, McCarthy
2012ViewWhy IT Education Matters: A Preliminary Study of the Value of an Information Systems Education McCarthy
2007ViewThe Development of a Comprehensive Assessment Plan: One Campus’ Experience White, McCarthy
2009ViewIT Still Bytes: Mainframes in IS Education Murphy, Sharma, Seay, McClelland
2008ViewComputer Lab to Go: A "Cloud" Computing Implementation Murphy, McClelland
2006ViewThe Value of a Project-Based Approach to Teaching Electronic Commerce in MBA Programs Kakish, McCord
2010ViewAn Information Systems Project Management Course Using a Service-Learning Model McCoy, Wymer
2014ViewCoastal Pacific Doctor Associates: Implementation of a Purchased System Schwieger, McDonald
2006ViewScientific Inquiry-Theory Construction: A Primer McDonald, Schneberger
2012ViewAssessing the Microsoft Office Skills Course: Computer-Mediated Delivery and Pre-and Post-Surveys Carpenter, McGinnis, Slauson, Snyder
2009ViewDeveloping a Smart Phone MBA Program McGraith, White
2014ViewCryptocurrencies: Technology Empowered Integration of Information Systems Enabling Currency Without Borders Serapiglia, Serapiglia, McIntyre
2012ViewClosing the Gap: Making Decisions based on data from the ISA Exam White, Rosenthal, Hilton, McKell
2011ViewA Tool for Program Review, Assessment and Accreditation: The Information Systems Assessment Test McKell, Kasper, White, Dhariwal, Hilton
2010ViewIS2010 Model Curriculum Core Assessment Examination – Supporting Institutional and Professional Development McKell, White, Dhariwal, Hilton
2007ViewAITP Sponsored Enhancements to the Information Systems Model Curriculum Longenecker, Leidig, McKell, Reichgelt, Russell, Waguespack, Landry, Wagner, White
2006ViewIntroductory Programming with ALICE as a Gateway to the Computing Profession McKenzie
2010ViewThe 2010 CIS Baccalaureate Degree Compared with IS 2010 Guidelines Pauli, Halverson, McKeown
2007ViewCreating a Real-World Capstone Experience for I.T. Management Students: Putting Theory into Practice Grant, McLaren
2013ViewTeaching Programming Style with Ugly Code McMaster, Sambasivam, Wolthuis
2012ViewRelational Algebra and SQL: Better Together McMaster, Sambasivam, Hadfield, Wolthuis
2012ViewSoftware Engineering Frameworks: Life Cycle Changes McMaster, Sambasivam, Wolthuis
2011ViewProblem Solving Frameworks for Mathematics and Software Development McMaster, Sambasivam, Blake
2011ViewSoftware Engineering Frameworks: Textbooks vs. Student Perceptions McMaster, Hadfield, Wolthuis, Sambasivam
2010ViewA Relational Algebra Query Language McMaster, Sambasivam, Anderson
2010ViewIntegrating Health Information Systems Into a Database Course: A Case Study Anderson, Zhang, McMaster
2009ViewA Probability Model for Belady's Anomaly McMaster, Sambasivam, Anderson
2008ViewThree Software Development Gestalts McMaster, Rague, Hadfield, Anderson
2008ViewTwo Frameworks for Discrete Mathematics McMaster, Rague, Hadfield
2007ViewTwo Gestalts for Mathematics: Logical vs. Computational McMaster, Rague, McMaster, Blake
2007ViewTwo Gestalts for Mathematics: Logical vs. Computational McMaster, Rague, McMaster, Blake
2006ViewTeaching Relational Algebra and Relational Calculus: McMaster, Anderson, Blake
2012ViewMobile technologies, social media, and crowdsourcing: how students get their local news Breese-Vitelli, McMillion, Vitelli
2009ViewKnowledge Management Using Weblogs in Information Technology Education Lee, Shah, Mehta
2007ViewAn IT Compliance Course Emphasizing Information System Design and Software Testing Mehta, Lee, Shah
2006ViewService Oriented Architecture:Concepts and Implementation Mehta, Lee, Shah
2010ViewExploring the Connection between Age and Strategies for Learning new Technology Related Tasks Meiselwitz, Chakraborty
2009ViewIntroducing Good Design Principles in an early System Engineering Course Pereira, Martinez, Felice, Meliendrez
2010ViewDeveloping Information Systems Education in a Network – Lessons Learned from a R&D Project Melin, Axelsson
2010ViewHow to Use the Potential of Learning Outcomes in IS Courses – Listening to the Voices of Students Axelsson, Melin
2010ViewTowards a Model for Learning Outcomes Wedlund, Axelsson, Melin
2009ViewLearning Outcomes in Use Wedlund, Axelsson, Melin
2006ViewProject Based Learning – An Emergent Framework for Designing Courses Melin, Axelsson, Wedlund
2006ViewProject Oriented Student Work Cronholm, Melin
2008ViewIssues and Challenges for Selecting a Programming Language in a Technology Update Course Ali, Mensch
2009ViewTracking Women and Minorities as They Attain Degrees in Computing and Related Fields Sorkin, Gore, Mento, Stanton
2006ViewEncouraging Women and Minorities to Attain Degrees in Computing and Related Fields Mento, Sorkin, Prettyman
2014ViewWhat's the Price of Privacy? A Study of the Perceptions of College Students and Industry Professionals on the Costs of Information Privacy Kim, Metzer, Agnor, Homan, Breese
2014ViewImproving an Information Systems Capstone/Consulting Course for Non-Traditional Undergraduate Students Mew
2013ViewA Study of E-Readiness Assessment: The Case of Three Universities in Nigeria Eweni, Meyinsse, Mbarika, Okpechi
2014ViewAligning Academic Curricula to Industrial Needs Omar, Miah, Nkabyo
2014ViewUsing Facebook for Course Delivery Miah, Omar, Karadeniz
2013ViewA Digital Ecosystems Approach to Biological Ecosystem Simulation Model Fit Optimization Debuse, Miah, Debuse, Lawson
2013ViewDeveloping a Campus Social Website for Buying, Selling, and Trading Textbooks Miah, Omar, Sagiroglu
2013ViewDigital Evolution of the Written Language Omar, Miah
2012ViewEffects of Social Networking on Adolescent Education Miah, Omar, Allison
2011ViewDigital Age: Technology Progress in Developing Countries Miah, Omar
2010ViewSelecting a Good Conference Location based on Participants’ Interests Miah
2011ViewWhatever Happened to Richard Reid’s List of First Programming Languages? Siegfried, Greco, Miceli, Siegfried
2013ViewThe Google Online Marketing Challenge: Miko
2010ViewTaking it to the Top: Frydenberg, Miko
2006ViewCapstone Project Experiences: Integrating Computer Science & the Liberal Arts Miles, Kelm
2010ViewClass Service Quality: Moving Beyond SERVQUAL Miller, Brooks
2008ViewEnhancing American K-12 Technology Education to a Global Standard Miller, Iyer
2014ViewUSMCo Payroll System Cohill, Dudley, Gregg, Millette, Zinnecker, Havelka
2008ViewSoftware Plagiarism in Undergraduate Programming Classes Abraham, Milligan
2006ViewOnline Content Editing - An Evaluation and Comparative Study Sambasivam, Mills
2012ViewReflecting on Religious Principles for Teaching Ethical Values in an E-Business Course Mirza
2007ViewStudents’ Perceived Barriers to In-Class Participation in a Distributed and Gender Segregated Educational Environment Mirza
2014ViewUnderstanding IT Change Management Challenges at a Financial Firm Pandey, Mishra
2013ViewGender Rationales and Success Factors in Assessing and Selecting a Major in Information Technology at the Undergraduate Level of a University Program: A Focus Group Approach Mishra, Draus, Caputo, Leone, Kohun, Repack
2014ViewBusiness Analytics in Practice and in Education: A Competency-based Perspective Mamonov, Misra, Jain
2014ViewA Perception Study of Bullying Prevalence in the Information Systems Profession Lawler, Molluzzo
2014ViewA Proposed Concentration Curriculum Design for Big Data Analytics for Information Systems Students Lawler, Molluzzo
2013ViewA Comparison of Faculty and Student Perceptions of Cyberbullying Molluzzo, Lawler
2012ViewA Comprehensive Survey on Cyberbullying Perceptions at a Major Metropolitan University – Faculty Perspectives Molluzzo, Lawler, Manneh
2011ViewA Study of the Perceptions of College Students on Cyberbullying Molluzzo, Lawler
2011ViewAn Expanded Study of Net Generation Perceptions on Privacy and Security on Social Networking Sites (SNS) Molluzzo, Lawler, Doshi
2008ViewAn Expanded Study of Integrating Issues of Location-Based Privacy with Mobile Computing Into General Curriculum of Universities Molluzzo, Lawler
2007ViewImplementing Ethical and Legal Issues in an ABET Accredited IS Programs Molluzzo, Farkas
2007ViewIntegrating Issues of Location-Based Privacy with Mobile Computing Into International Information Systems Curricula Lawler, Molluzzo
2006ViewGender and Technology Careers: The Gap Continues Molluzzo, Dwyer
2013ViewEnterprise Systems: A Measure of Student Learning Kreie, Mora-Monge, Shannon
2010ViewAn Enterprise System and a Business Simulation Kreie, Shannon, Mora-Monge
2009ViewGoing from data to decisions: Preparing Kreie, Mora-Monge, Shannon
2009ViewComputers for Humanity: A Service Learning Approach to Computer Education Pauli, Podradsky, Pauli, Moran
2013ViewA traditional school towards a new dimension – social learning Ferreira, Moreira, Seruca
2012ViewExploring Integration Issues in A Blended Mobile Learning Model context oriented applied to a Requirement Engineering course – Mobility, Context And Cloud Moreira, Ferreira
2011ViewIs Student Performance On The Information Sys-tems Analyst Certification Exam Affected By Form Of Delivery Of Information Systems Coursework? Haga, Moreno, Segall
2007ViewSecurity Practices of Students Morgan, Lorents, Maris
2007ViewAgile Software Development Methods Curriculum in Thailand – A Survey of Thai Universities Morien, Tetiwat
2010ViewAn Improved Database System for Program Assessment Haga, Morris, Morrell
2009ViewMeasuring the Value Added to Segall, Lege, Morrell
2008ViewA Database System for IS Curriculum Assessment using ISA Examination Performance Segall, Ghosh, Morrell
2007ViewChanges in the Systems Analysist Skill set: 2006 versus 2001 Haga, Morris, Mawhinney, Morrell
2006ViewThe Information Systems Analyst National Assessment Exam: Factors for Success Segall, Gollhardt, Morrell
2013ViewWorkLight - A New Paradigm in Mobile Application Development Laverty, Morris
2011ViewPreparing for a Career as a Network Engineer Morris, Fustos, Haga
2010ViewAn Improved Database System for Program Assessment Haga, Morris, Morrell
2008ViewInterdisciplinary Introductory Course in Bioinformatics Kortsarts, Morris, Utell
2007ViewChanges in the Systems Analysist Skill set: 2006 versus 2001 Haga, Morris, Mawhinney, Morrell
2014ViewA Model for Establishing a Cybersecurity Center of Excellence Moskal
2008ViewComputer Security Implementation Roadmap - How to Implement Computer Security Moskal
2007ViewAdding Robotics to your Computer Science Curriculum Moskal
2007ViewImplementation Of Distance Learning Moskal
2006ViewA Case Study: Developing an Architectural Description for the Technology-Communications Engineering Viewpoint Steenkamp, Sabri Alomari, Mousa Basal , Kakish
2010ViewCreating and Using a Computer Networking and Systems Administration Laboratory Built Under Relaxed Financial Constraints Conlon, Mullins
2014ViewCybersecurity Curriculum Development: Introducing Specialties in a Graduate Program Bicak, Liu, Murphy
2013ViewAssessing Face to Face and Online Course Delivery using Student Learning Outcomes Sharma, Bryant, Murphy
2013ViewDocument Explosion in the World of Big Data – Curriculum Considerations Liu, Murphy
2012ViewDeveloping an Undergraduate Information Systems Security Track Sharma, Murphy, Rosso, Grant
2012ViewUsing Mobile Apps to Entice General Education Students into Technology Fields Liu, Murphy
2011ViewFusing Communication and Writing Skills in The 21st Century’s IT/IS Curricula Liu, Murphy
2011ViewMeasuring Assurance of Learning Goals: Murphy, Sharma, Rosso
2010ViewTeach or No Teach: Is Large System Education Resurging? Sharma, Murphy
2009ViewIT Still Bytes: Mainframes in IS Education Murphy, Sharma, Seay, McClelland
2008ViewComputer Lab to Go: A "Cloud" Computing Implementation Murphy, McClelland
2011ViewIS 2010 & ABET Accreditation: Perspectives and Issues on the Current Iteration Saulnier, Kasper, Mathieu, Murray, White
2009ViewThe Role of Technical Support in Updating Web Design Courses - A Case Example Ali, Murthy
2007ViewWeb Development in the Graduate IS Curriculum: Farkas, Murthy