| Conf Year | Article | Title | Authors | 
		
			| 2017 | View | “Hour of Code”: A Case Study | 
                       Du, Wimmer, Rada
                       | 
		
			| 2018 | View | Software Concepts Emphasized In Introductory Programming Textbooks
 | 
                       McMaster, Rague, Sambasivam, Wolthuis
                       | 
		
			| 2017 | View | A Comparison of Key Concepts in
Data Analytics and Data Science
 | 
                       McMaster, Wolthuis, Rague, Sambasivam
                       | 
		
			| 2016 | View | Java vs. Python Coverage of Introductory Programming Concepts: A Textbook Analysis | 
                       McMaster, Sambasivam, Rague, Wolthuis
                       | 
		
			| 2023 | View | Teaching DevOps Security Education with Hands-on Labware: Automated Detection of Security Weakness in Python
 | 
                       Akter , Rodriguez-Cardenas, Rahman, Wu, Rahman , Shahriar
                       | 
		
			| 2023 | View | Teaching DevOps Security Education with Hands-on Labware: Automated Detection of Security Weakness in Python
 | 
                       Akter , Rodriguez-Cardenas, Rahman, Wu, Rahman , Shahriar
                       | 
		
			| 2024 | View | Career Readiness of Recent Graduates in the Era of Digital Transformation: Insights from Multi-Level Focus Groups | 
                       Kim, Jones, Lang, Raider, Sheikh, Simione
                       | 
		
			| 2023 | View | Cybersecurity the Future of Non-Profit Rural Organizations: A Pilot Study  | 
                       Sharma , Breese, Ramljak
                       | 
		
			| 2025 | View | Survey on Design Mechanisms of Hybrid Chatbots in Academic Websites  | 
                       Rao, Li, Haddad, He
                       | 
		
			| 2017 | View | A System Architecture for Anonymity of Student Opinion Surveys | 
                       Ardalan, Ardalan, Rao, Alexander
                       | 
		
			| 2022 | View | A University’s Computing Excellence Scholarship: Chronicling the Journey’s First Year
 | 
                       Terwilliger, Zhang, Ray, Herath
                       | 
		
			| 2020 | View | Investigating Student Behavior in an Interdisciplinary Computing Capstone Course | 
                       Watson, Besmer, Banks, Ray, Derksen
                       | 
		
			| 2024 | View | Evaluating Stress and Driving Performance Using VR and Physiological Data: A Case Study | 
                       Razzak, Li, Sokhadze, He
                       | 
		
			| 2025 | View | Design Debt and Data Governance Failure: 
A Teaching Case on the 23andMe Genetic Breach  | 
                       Yates, Ream III
                       | 
		
			| 2024 | View | An Analysis of the Scope of Cybersecurity Education for Computer Information Systems Students
 | 
                       Ream III, Yates
                       | 
		
			| 2023 | View | The Design of Complementary Information Security and Cybersecurity Courses | 
                       Ream III, Yates
                       | 
		
			| 2025 | View | A Comparative Analysis of an LLM and  RAG (Retrrieval Augmented Generation) in a Question and Answer System | 
                       Balogun, Wimmer, Rebman Jr.
                       | 
		
			| 2025 | View | Computer-Supported Collaborative Learning: An Analysis of the Relationship Between Human Critical Thinking and the Use of Artificial Intelligence (AI) | 
                       Elijah , Wimmer, Rebman Jr.
                       | 
		
			| 2025 | View | Using a Large Language Model to Evaluate Content Quality in Nutritional YouTube Shorts | 
                       Powell, Powell, Rebman Jr., Wimmer
                       | 
		
			| 2024 | View | A Comparative Analysis of Oversampling Methods for Predicting Credit Card Default with Logistic Regression | 
                       Tourt, Booker, Rebman Jr., Jin
                       | 
		
			| 2024 | View | A Comparison of Large Language Models for Oncology Clinical Text Summarization | 
                       Izuchukwu , Wimmer, Rebman Jr.
                       | 
		
			| 2024 | View | An Entrepreneurial and Experiental Learning Project to Intergrate Business Concepts to an Introductory IS/IT Course | 
                       Rebman Jr., Wimmer, Levkoff
                       | 
		
			| 2024 | View | RAG Chatbot for Healthcare related prompts using Amazon Bedrock | 
                       Richard-Ojo, Wimmer, Rebman Jr.
                       | 
		
			| 2023 | View | Data Analytics Position Description Analysis: Skills Review and Implications for Data Analytics Curricula | 
                       Booker, Rebman Jr., Wimmer, Levkoff, Powell, Breese
                       | 
		
			| 2023 | View | Network Intrusion Detection system with Machine learning Intrusion Detection System with Machine Learning As a Service | 
                       Kangethe , Wimmer, Rebman Jr.
                       | 
		
			| 2023 | View | Using Textual Analytics to Process Information Overload of Cyber Security Subreddits | 
                       Omakwu , Wimmer, Rebman Jr.
                       | 
		
			| 2022 | View | An Industry Survey of Analytics Spreadsheet Tools Adoption: Microsoft Excel vs Google Sheets | 
                       Rebman Jr., Wimmer, Booker, Levkoff, McMurtrey, Powell
                       | 
		
			| 2020 | View | Pandemic Shift: Impact of COVID-19 on IS/Microsoft Office Specialist Excel Certification Exam Classes: Remote Testing and Lessons Learned  | 
                       Rebman Jr., White, Booker, Wimmer, Powell
                       | 
		
			| 2018 | View | A Nationwide Exploratory Study on Faculty Opinions on Student Preparation, Performance, and Evaluations | 
                       Rebman Jr., Wimmer, Booker
                       | 
		
			| 2017 | View | Building Excel Expertise:  A Guide in Best Practices | 
                       Tastle, Mead, Rebman Jr., Marks, Phillips
                       | 
		
			| 2022 | View | Measuring Learners’ Cognitive Load When Engaged with an Algorithm Visualization Tool | 
                       Fathi, Teresco, Regan
                       | 
		
			| 2025 | View | Arizona’s CyberSupply: Identifying Gateway-to-Cybersecurity and Cybersecurity Courses and Pathways in Secondary Education | 
                       Wagner, Honomichl, Beasley, Reid, Bradford, Urbaszewski
                       | 
		
			| 2016 | View | Aardvark Design: The Impact of IT Infrastructure on Application Development and Deployment | 
                       Held, Rein, Stofel, Valentine, Havelka
                       | 
		
			| 2025 | View | Boosting Student Engagement and Analytics Skills Through Competition | 
                       Reinicke, Bui, Perotti, Tang
                       | 
		
			| 2025 | View | Cyber Pass – A Cyber Security Personality Assessment for Organizations | 
                       Reinicke, Mislan, Blom
                       | 
		
			| 2024 | View | Fear and Loathing in Self Driving Cars | 
                       Reinicke, Spencer
                       | 
		
			| 2017 | View | ViNEL: A Virtual Networking Lab for Cyber Defense Education | 
                       Reinicke, Baker, Toothman
                       | 
		
			| 2016 | View | How to Teach Emotional Intelligence Skills | 
                       Connolly, Reinicke
                       | 
		
			| 2015 | View | How secure is education in Information Technology?  A method for evaluating security education in IT | 
                       Grover, Reinicke, Cummings
                       | 
		
			| 2025 | View | Improving Scrum Adoption Attitudes in Non-Traditional Industry Settings | 
                       Vonderhaar, Davidoff, Reynolds, Ochoa, Towhidnejad, Pembridge
                       | 
		
			| 2022 | View | IS2020 Model Curriculum: Understanding the Curricular Gaps for ACBSP Accredited Programs | 
                       Podeschi, Reynolds, Voss
                       | 
		
			| 2021 | View | MWC3:  An example of an Intercollegiate Regional Computing Conference  | 
                       Reynolds, Fleenor
                       | 
		
			| 2018 | View | Effective Internships: A Study Combining Curriculum Development, Student Performance, and Program Assessment | 
                       Reynolds, Ferguson, Leidig, Hornik
                       | 
		
			| 2017 | View | Be Careful What You Wish For: The Continued Limiting of Computing Majors | 
                       Reynolds, Ferguson, Linville
                       | 
		
			| 2016 | View | Programming in the IS Curriculum:  Are Requirements Changing for the Right Reason? | 
                       Reynolds, Adams, Ferguson, Leidig
                       | 
		
			| 2016 | View | The Personality of a Computing Major: | 
                       Reynolds, Adams, Ferguson, Leidig
                       | 
		
			| 2015 | View | A Tale of Two Curricula:  The Case for | 
                       Reynolds, Ferguson, Leidig
                       | 
		
			| 2015 | View | Expanding Participation in Computing: | 
                       Leidig, Ferguson, Reynolds
                       | 
		
			| 2020 | View | Plugin-based Tool for Secure Mobile Application Development | 
                       Shahriar, Zhang, Valero, Sneha, Riad, Islam, Ahamed
                       | 
		
			| 2023 | View | Pragmatic Due Diligence - in the World of AI | 
                       Rice
                       | 
		
			| 2022 | View | Exploring The Strategies Collegiate Cybersecurity Instructors Need To Maximize Engagement Of Generation Z Cybersecurity Learners | 
                       Sambasivam, Rice
                       | 
		
			| 2015 | View | A Comparison Study in Open Source Learning Management Software | 
                       Lester, Rice
                       | 
		
			| 2015 | View | Developing Project Based Learning, Integrated Courses from Two Different Colleges at an Institution of Higher Education: An Overview of the Processes, Challenges, and Lessons Learned | 
                       Rice, Lester
                       | 
		
			| 2024 | View | RAG Chatbot for Healthcare related prompts using Amazon Bedrock | 
                       Richard-Ojo, Wimmer, Rebman Jr.
                       | 
		
			| 2023 | View | An Introduction to Intelligent Process Automation  | 
                       Mentzer, Richards
                       | 
		
			| 2022 | View | Enhancing Learning in Business Education | 
                       Fullick-Jagiela, Kelly, Paros, Awudu, Riello
                       | 
		
			| 2015 | View | Salient Beliefs in Majoring in Management Information Systems:  An Elicitation Study | 
                       Chipidza, Green, Riemenschneider
                       | 
		
			| 2025 | View | Putting Knowledge Where It's Needed - Development of a Pressure Injury Clinical Decision Support System | 
                       Campbell, Campbell, Pittman, Riley, Otts
                       | 
		
			| 2025 | View | Factors Influencing Student Participation in Excel MOS Certification | 
                       Riskas, Bentley, Krebs, Smith
                       | 
		
			| 2019 | View | Are Professional Science Master’s (PSM) Programs Beneficial for Graduates? 
An Evaluation of PSM Programs
 | 
                       Rivenbark, Cummings, Kline, Patterson
                       | 
		
			| 2017 | View | Mobile Forensics Hands-On Workshop | 
                       Fryling, Rivituso
                       | 
		
			| 2015 | View | Teaching Information Systems Courses in China: Challenges, Opportunities, and Lessons for US Educators | 
                       Fryling, Rivituso
                       | 
		
			| 2015 | View | Student Success - Interweaving Skills for Success in Computer Introductory Courses | 
                       Hashemi, Robbins
                       | 
		
			| 2025 | View | Experiential Learning to Increase Student Motivation and Engagement in an Introductory Computing Course  | 
                       Robertson, Pollacia, Kerven, Abraham, Guo
                       | 
		
			| 2023 | View | Truth or Media: Fallacies of Perceived Cyber Attribution | 
                       Abegaz, Payne, Robertson
                       | 
		
			| 2023 | View | Teaching DevOps Security Education with Hands-on Labware: Automated Detection of Security Weakness in Python
 | 
                       Akter , Rodriguez-Cardenas, Rahman, Wu, Rahman , Shahriar
                       | 
		
			| 2023 | View | Data-Driven Curriculum Design: Aligning Job Market Needs and Educational Content through Job Ad Analytics | 
                       Müller, Felby, Bille, Mathiasen, Roesen, Nielsen
                       | 
		
			| 2024 | View | Improving Public Speaking through Virtual Reality | 
                       Gouws, Case, Rogalski
                       | 
		
			| 2024 | View | The Virtual Stage: Metaverse Integration in Effective Speaking Courses  | 
                       Patterson, Temple, Anderson, Rogalski, Mentzer
                       | 
		
			| 2023 | View | Investigating How Technical Acumen and Student Grit Affect the Performance of Students in Online Learning Environments | 
                       Johnson, Brown, Kelly, Romero
                       | 
		
			| 2016 | View | Case Study: Water Level Detection System | 
                       Scott, Rosen
                       | 
		
			| 2022 | View | Using GitLab for Education program for a collaborative Cyber Infrastructure among Cybersecurity educators, learners, and researchers across the Pennsylvania State University Commonwealth Campuses | 
                       Landmesser, Breese, Roshanaei, Gardner
                       | 
		
			| 2016 | View | Teaching an Old Dog New Tricks: | 
                       Rossmiller, Lawrence, Clouse, Looney
                       | 
		
			| 2023 | View | Educating the Next Generation of CSOs:  An Exercise in Conversational Role Play with ChatGPT | 
                       Mitra, Schwieger, Roy
                       | 
		
			| 2015 | View | Strategies and Approaches for Teaching Storage and Data Management – Faculty Perspectives, Insights & Suggestions | 
                       Conway, Kline, Pickard, Royster, Woods, Zullo
                       | 
		
			| 2024 | View | Unlocking Generative AI Potential in Entrepreneurs: An Experiential Learning Approach. | 
                       Triantoro, Rua, Lang
                       | 
		
			| 2017 | View | University Micro-Credentials and the Need
for Agile IS Skill Development Programs | 
                       Rubleske, Cata
                       | 
		
			| 2025 | View | Rethinking the Introduction to Algorithms: A Pedagogical Approach for First-Year College Students
 | 
                       Rude, Frydenberg
                       | 
		
			| 2023 | View | Fostering Student Identities in Introduction to Programming | 
                       Schmalz, Connolly, Rush
                       | 
		
			| 2023 | View | Navigating PMI’s New Body of Knowledge in IS Project Management | 
                       Rush, Connolly
                       | 
		
			| 2022 | View | What needs updated and when? Project Management Education Implications of the Seventh Edition PMBOK Update | 
                       Rush
                       | 
		
			| 2021 | View | An Agile Framework for Teaching with Scrum in the IT Project Management Classroom  ** Best JISE Paper (2020) | 
                       Rush, Connolly
                       | 
		
			| 2019 | View | Emotional Intelligence and Alpha Skills for IT Project Management | 
                       Connolly, Rush
                       | 
		
			| 2018 | View | Cooperative Learning Activities for Introduction to MIS | 
                       Connolly, Rush
                       | 
		
			| 2015 | View | Keep I.T. SIMple! How to Make Teaching Easy and Student Learning Limitless (yes, it’s possible!)   | 
                       Broadway, Russell
                       | 
		
			| 2025 | View | Teaching Data Literacy Through Operational Analytics: A Car Wash Case Study | 
                       Mentzer, Russo, Lawshe, Mullen
                       | 
		
			| 2018 | View | Principles of Program Revision for Computing Degrees: A Data-Driven 360 Degree Program Review Model | 
                       Peltsverger, Li, Rutherfoord
                       | 
		
			| 2025 | View | Using AI to Predict and Mitigate Supply Chain Risk in Contested Logistics | 
                       Scott, Rutner
                       | 
		
			| 2021 | View | Use of Artificial Intelligence to Grade Student Discussion Boards: An Exploratory Case Study | 
                       Rutner, Scott
                       | 
		
			| 2019 | View | Using an Ocean Shipping Game to Teach Transportation Fundamentals to Supply Chain Management Students
 | 
                       Scott, Rutner
                       |