A
A Case Study on Using the Mendix Low Code Platform to support a Project Management Course,
(Paper)(4621)
|
A Cross Collegiate Analysis of the Curricula of Business Analytics Minor Programs,
(Paper)(4634)
|
A Nationwide Exploratory Study on Faculty Opinions on Student Preparation, Performance, and Evaluations,
(Paper)(4648)
|
A Preliminary Study: The Use of VoiceThread in Online Business Courses,
(Paper)(4609)
|
A Sampling of IT Service Learning Activities: Possible Impact on Students and Community Partners,
(Paper)(4639)
|
A Sentiment and Linguistic Analysis of Online Reviews of Online Universities,
(Paper)(4616)
|
A Study of Gender Bias in Grading in the MCIS Program at CSU from 2013 through 2017,
(Paper)(4605)
|
Active Learning Using Debates in An IT Strategy Course,
(Paper)(4620)
|
An experiment on the impact of critical thinking instruction on the understanding of IS implementation problems,
(Paper)(4628)
|
Applying an Agile Approach in an Information Systems Capstone Course
,
(Paper)(4622)
|
B
Building the Physical Web: A Campus Tour
Using Bluetooth Low Energy Beacons
,
(Paper)(4613)
|
C
Certifying Business Students in Microsoft Office Specialist Certification Excel Core Exam: Lessons Learned,
(Paper)(4618)
|
Collaborative Education: Building a Skilled Software Validation and Verification Community,
(Paper)(4645)
|
Connecting the Dots: Strategies to Recruit Computer Information Systems Students,
(Paper)(4611)
|
Cooperative Learning Activities for Introduction to MIS,
(Paper)(4619)
|
D
Data Cleansing: An Omission from Data Analytics Coursework,
(Paper)(4631)
|
Dotting i’s and Crossing T’s: Integrating Breadth and Depth in an Undergraduate Cybersecurity Course,
(Paper)(4654)
|
E
Easy as Py: A First Course in Python
with a Taste of Data Analytics
,
(Paper)(4614)
|
Engaging College Students on Collaborative Projects with People with Cognitive Disabilities through e-Portfolios,
(Paper)(4606)
|
F
From the Campus to the Conference "A Case Study in the Design and Development of Cyber Contests for Professional Conferences",
(Paper)(4640)
|
H
Hour of Code: A Study of Gender Differences in Computing,
(Paper)(4624)
|
I
Information System Curriculum versus Employer Needs: A Gap Analysis,
(Paper)(4636)
|
Integrating Big Data Analytics into an Undergraduate Information Systems Program using Hadoop,
(Paper)(4632)
|
Interim Awardee Outcomes after Four Years of a STEM Scholarship Program,
(Paper)(4627)
|
IT Infrastructure Strategy in an Undergraduate Course,
(Paper)(4651)
|
K
Keeping the MIS Capstone Relevant: Three Cases,
(Paper)(4644)
|
Knowledge and Skill Gaps in Programming,
(Paper)(4647)
|
L
Learning by Teaching through Collaborative Tutorial Creation: Experience using GitHub and AsciiDoc,
(Paper)(4603)
|
Linking Programmer Analyst Skills to Industry Needs: A Current Review,
(Paper)(4626)
|
M
Mixed-Approach Social Comparison for Improving Online Discussion Efficacy: Insights from Field Experiments,
(Paper)(4642)
|
N
Navigating the Academic “White Water”:
Strategic Issues for Computer Information Systems Education
,
(Paper)(4602)
|
P
Partial Credit on Multiple-choice Exams: Does It Help or Hurt Students?,
(Paper)(4625)
|
Peer Tutors: To Embed or Not to Embed,
(Paper)(4646)
|
Principles of Program Revision for Computing Degrees: A Data-Driven 360 Degree Program Review Model,
(Paper)(4653)
|
Process-Focused Approach to a Systems Analysis & Design Group Project ,
(Paper)(4629)
|
Q
Querying Bitcoin Blockchain Using SQL,
(Paper)(4607)
|
R
Reflections on Appling for CAE-CDE
Designation
,
(Paper)(4630)
|
Reflections on Applying the Growth Mindset Approach to Computer Programming Courses,
(Paper)(4641)
|
S
Simulation for Network Education: Transferring Networking Skills Between Simulated to Physical Environments,
(Paper)(4617)
|
Software Concepts Emphasized In Introductory Programming Textbooks
,
(Paper)(4649)
|
T
Teaching Formal Methods in the Context of Model Driven Engineering,
(Paper)(4650)
|
Teaching of Clinical Workflow Analysis with Process Mining: An Experience Report,
(Paper)(4658)
|
Teaching Professionalism and Ethics in Information Technology by Deliberative Dialogue ,
(Paper)(4608)
|
The Contribution of the CISSP (Certified Information Systems Security Professional) to Higher Education Research,
(Paper)(4601)
|
The Soul of the Introductory Information Systems Course
,
(Paper)(4643)
|
Toward CAE-CDE 4Y Designation through Curriculum Modernization of a Traditional Computer Science Undergraduate Program,
(Paper)(4657)
|
Toward Visualizing Computing Curricula: The Challenge of Competency
,
(Paper)(4633)
|
U
Using Codecademy Interactive Lessons as an Instructional Supplement in a Python Programming Course,
(Paper)(4615)
|
W
What! No GUI?,
(Paper)(4635)
|