| Institution | Year Pub |  | Title | Authors | 
			| KAIST | 2005 | View | A Curriculm Design for E-commerce Security | Kim, Han, Kim, Choi | 
			| KAIST | 2002 | View | Educational Requirement Analysis for Information Security Professionals in Korea | Kim, Choi | 
			| Kansas State University | 2025 | View | Teaching Tip: Integrating NoSQL Databases Into a Data Analytics Course | Sharma, Bowman | 
			| Kansas State University | 2016 | View | Academic Integrity: Information Systems Education Perspective | McHaney, Cronan, Douglas | 
			| Kansas State University | 2012 | View | Technology in the Classroom: Using Video Links to Enhance Experiential Learning | Chilton | 
			| Kansas State University | 2008 | View | Exploring the Importance of Mentoring for New Scholars: A Social Exchange Perspective | Ugrin, Odom, Pearson | 
			| Kansas State University | 2006 | View | Data Modeling Education: The Changing Technology | Chilton, McHaney, Chae | 
			| Kansas State University | 2006 | View | Data Modeling Using Entity Relationship Diagrams: A Step-Wise Method | Chilton | 
			| Karlsruhe Institute of Technology | 2025 | View | Using Generative AI in Higher Education: A Guide for Instructors | Gimpel, Hall, Decker, Eymann, Gutheil, Lämmermann, Braig, Maedche, Röglinger, Ruiner, Schoch, Schoop, Urbach, Vandirk | 
			| Kean University | 2002 | View | Evaluating the Virtual Management Information Systems (MIS) Classroom | Abraham | 
			| Kean University | 1995 | View | The Integrated and Interactive MIS Classroom: Using Meeting and Presentation Software to Create an Active Learning Environment | Abraham | 
			| Keimyung University | 2008 | View | Analysis of Skills Requirement for Entry-Level Programmer/Analysts in Fortune 500 Corporations | Lee, Han | 
			| Kennesaw State University | 2025 | View | Teaching Tip: Decryption and Reverse Engineering - An Applied Tutorial for a Security Programming Course | Batra, Zafar, Dembla | 
			| Kennesaw State University | 2025 | View | Teaching Tip: Establishing a GenCyber Student Camp for High School Students in Underserved Communities | Duong, Valero, Oakley, Plachkinova | 
			| Kennesaw State University | 2024 | View | Fintech and Digital Payments: Developing a Domain Knowledge Framework | Gupta, Xie, Zafar | 
			| Kennesaw State University | 2022 | View | Engaged Brains: A Course on Neuro-Information Systems | Randolph, Raven | 
			| Kennesaw State University | 2022 | View | Special Issue Editorial: Equality, Diversity, and Inclusion in IS Education | Lang, Freeman, Kiely, Woszczynsk | 
			| Kennesaw State University | 2021 | View | Agile Course Design: Multi-University Faculty Collaboration to Design the MIS Course for an Online MBA Program | Woszczynsk, Pridmore, Bandyopadhyay, Godin, Prince | 
			| Kennesaw State University | 2017 | View | Learning Outcomes for Cyber Defense Competitions | Woszczynsk, Green | 
			| Kennesaw State University | 2016 | View | Perspectives on Open Access Opportunities for IS Research Publication: Potential Benefits for Researchers, Educators, and Students | Woszczynsk, Whitman | 
			| Kennesaw State University | 2014 | View | Bringing Business Intelligence to Health Information Technology Curriculum | Zheng, Zhang, Li | 
			| Kennesaw State University | 2014 | View | Developing Health Information Technology (HIT) Programs and HIT Curriculum: The Southern Polytechnic State University Experience | Zhang, Reichgelt, Rutherfoord, Wang | 
			| Kennesaw State University | 2014 | View | Promoting Information Systems Major to Undergraduate Students - A Comprehensive Investigation | Li, Zhang, Zheng | 
			| Kennesaw State University | 2013 | View | Teaching Introductory Programming to IS Students: The Impact of Teaching Approaches on Learning Performance | Zhang, Zhang, Stafford, Zhang | 
			| Kennesaw State University | 2012 | View | A Cross-Functional Systems Project in an IS Capstone Course | Maloni, Dembla, Swaim | 
			| Kennesaw State University | 2010 | View | A Call to IS Educators to Respond to the Voices of Women in Information Security | Woszczynsk, Shade | 
			| Kennesaw State University | 2008 | View | A Model for Using a Capstone Experience as One Method of Assessment of an Information Systems Degree Program | Murray, Perez, Guimaraes | 
			| Kennesaw State University | 2006 | View | Student Perceptions of Diversity Issues in IT | Woszczynski, Myers, Moody | 
			| Kennesaw State University | 2005 | View | Personality and Programming | Woszczynsk, Guthrie, Shade | 
			| Kennesaw State University | 2003 | View | An IS Capstone Project: The Mywick Property Management System | Myers | 
			| Kent State University | 2025 | View | Can Gamification Change Learners’ Ability and Motivation? Role of Eustress in the Context of Gamified ERP Training | Patwary, John, Park, Zhao, Kwak, Patuwo | 
			| Kent State University | 2007 | View | A Student-Centric Approach to Large Introductory IS Survey Courses | Bakke, Faley, Steinberg | 
			| Kent State University | 2006 | View | Mitigating Negative Behaviors in Student Project Teams: An Information Technology Solution | Brandyberry, Bakke | 
			| Kent State University | 2001 | View | The Effectiveness of Computer-Based "Game Show" Formats in Survey Courses: A Quasi-Experiment | Brandyberry, Pardue | 
			| Kent State University | 1999 | View | Improving Student Satisfaction in Large-sized Classes through a Computer Mediated Communications System | Janicki, Steinberg | 
			| Kentucky State University | 2000 | View | Some Observations on Internet Addiction Disorder Research | Chebbi, Koong, Liu, Rottman | 
			| King Abdulaziz University | 2021 | View | Emerge2Maturity: A Simulation Game for Data Warehouse Maturity Concepts | Mannino, Khojah, Gregg | 
			| King Fahd Military Medical Complex | 2009 | View | Improving the Communication Skills of IS Developers during Requirements Elicitation using Experiential Learning | Qurban, Austria | 
			| Korea Institute of Science and Technology | 2004 | View | Bringing E-Government into the Classroom: A Case of E-Commerce Education | Song, Rao, Braynov | 
			| KPMG LLP | 2011 | View | Bank Solutions Disaster Recovery and Business Continuity: A Case Study for Business Students | Camara, Crossler, Midha, Wallace | 
			| Kunsan National University | 2012 | View | Exploring factors that influence students’ behaviors in information security | Yoon, Hwang, Hwang, Kim | 
			| Kuwait University | 2025 | View | A Content Analysis of Business Job Advertisements Using Data Mining Techniques | Alshameri, Adhikari |