Conf Year | Article | Title | Authors |
2015 | View | Vocabularies for Describing Digital Media |
Calloway, Dwyer
|
2021 | View | Analysis of STeM Student Perceptions of a Re-Engineered General Education Program
|
Wolthuis, Curtis, Carlson, Strain, Campbell
|
2020 | View | Re-Engineering General Education and the Impact on Undergraduate Technology Students |
Wolthuis, Campbell
|
2019 | View | Title IX mandate to report non-consensual sexual contact: An application of text data analytics to understand the views of university freshmen |
Modaresnezhad, Canel
|
2015 | View | Student Perceptions of Introductory Database Concepts and Database Privacy Issues |
Cannoy, Lomo-David
|
2024 | View | A UTAUT-based analysis of the Adoption Factors of Student Evaluations of Teaching |
Caporusso, Doan, Acharya, Pandit, Shrestha, Le, Khatri, Pond
|
2024 | View | From Angry Reviews to Classroom Success: Using LLMs to Synthesize RateMyProfessors.com Data |
Caporusso, Doan, Acharya, Pandit, Shrestha, Khatri, Pond, Le
|
2022 | View | A Chatbot for Teaching Secure Programming |
Walden, Caporusso, Atnafu
|
2022 | View | The State of FinTech in Academia: An AACSB Survey |
Fowler, Marshall, Cardon
|
2018 | View | Creating a Culture for Internships and Experiential Learning |
Dillon, Dillon, Carl
|
2018 | View | Reflections on Applying the Growth Mindset Approach to Computer Programming Courses |
Carl, Babb, Abdullat
|
2021 | View | Analysis of STeM Student Perceptions of a Re-Engineered General Education Program
|
Wolthuis, Curtis, Carlson, Strain, Campbell
|
2016 | View | Coin Counter: Gamification for Classroom Management |
Carlson, Harris, Harris
|
2024 | View | Improving Public Speaking through Virtual Reality |
Gouws, Case, Rogalski
|
2017 | View | University Micro-Credentials and the Need
for Agile IS Skill Development Programs |
Rubleske, Cata
|
2023 | View | Developing a Data Analytics Practicum Course |
Bhatnagar, Pry, Causer, Lucci, Zilic
|
2024 | View | A Review of Blockchain Technology Programs in Higher Education |
Gürpinar, Verma, Leonard, Jones, Ceccucci
|
2024 | View | Navigating the AI Landscape: An Analysis of AI Developer Tools Usage, Sentiment, and Trust Among IT Professionals |
Ceccucci, Peslak, Jones
|
2023 | View | Investigating the Relationship between Developer Job Satisfaction and Life Satisfaction: A Global Analysis |
Peslak, Ceccucci, Jones, Leonard
|
2019 | View | Undergraduate Business Analytics and the overlap with Information Systems Programs |
Ceccucci, Jones, Toskin, Leonard
|
2018 | View | Alpha Insurance: A Predictive Analytics Case to Analyze Automobile Insurance Fraud using SAS Enterprise Miner |
McCarthy, Ceccucci, McCarthy, Halawi
|
2017 | View | Harnessing Business Analytics: Analyzing Data Analytics Programs in U.S. Business Schools |
Parks, Ceccucci, McCarthy
|
2017 | View | International Service Learning in IS Programs: The Next Phase – An Implementation Experience |
Jones, Ceccucci
|
2016 | View | Review of Masters in Business Analytics Curriculum |
Ceccucci, Kruck, Peslak, Sendall, Hunsinger, Hill
|
2015 | View | A Longitudinal Study of CIS Students, Course Performance and MBTI Personality Types |
Sendall, Peslak, Ceccucci, Kruck
|
2019 | View | Student Perceptions of Challenges and Role of Mentorship in Cybersecurity Careers: Addressing the Gender Gap |
Pinchot, Cellante, Mishra, Paullet
|
2017 | View | Revisiting an Introductory Computer Information Systems Course: An Update to Course Topics and Incorporation of Project-Based Learning |
Cellante, Pinchot
|
2016 | View | How to Encourage Middle School Girls Interested in STEM+C Education: An Assessment of Current Status |
Mishra, Cellante, Igoche
|
2015 | View | Redesigning the Traditional Introductory Computer Course: A Pretest/Posttest Analysis |
Mishra, Cellante, Igoche, Kavanaugh
|
2016 | View | Instructional Design Skills, Methods, and Knowledge in the era of MOOCs: A Research Proposal |
Chahal
|
2019 | View | Integrative Learning and Interdisciplinary Information Systems Curriculum Development in Accounting Analytics |
Woodside, Augustine, Chambers, Mendoza
|
2018 | View | Storing and Querying Bitcoin Blockchain Using SQL Databases |
Yue, Chandrasekar, Gullapalli
|
2017 | View | Shifting Perspectives: Stimulating Critical Thinking Through the Use of Virtual Reality in an IS Curriculum |
Chapman, Bhatnagar
|
2017 | View | The Enhanced Virtual Laboratory: Extending Cyber Security Awareness through a Web-based Laboratory
|
Black, Chapman, Clark
|
2024 | View | Online Maps and Route-Finding – Lots of Ways to Fail, Yet Still a Great Success!
|
Witman, Prior, Nickl, Njunge, Ngetich, Chaudhry
|
2021 | View | The COVID-19 Pandemic Impact on Course Grades: A Remote Learning Analysis |
Chawdhry, Paullet, Baugh, Nakama
|
2015 | View | Assessing Faculty Perceptions and Techniques to Combat Academic Dishonesty in Online Courses |
Paullet, Chawdhry, Douglas, Pinchot
|
2018 | View | Dotting i’s and Crossing T’s: Integrating Breadth and Depth in an Undergraduate Cybersecurity Course |
Yates, Frydenberg, Waguespack, McDermott, OConnell, Chen, Babb
|
2020 | View | Engaging Government-Industry-University Partnerships to Further Gender Equity in STEM Workforce Education through Technology and Information System Learning Tools |
Knestis, Cheng, Feng
|
2015 | View | Engage and transform today’s students into critical thinkers with Cengage Learning’s MindTap for Principles of MIS. |
Sabatino, Chepelsky
|
2020 | View | What is a Gamer: An exploration of culture, identity, and belonging? |
Breese, Chiampi , Bayer, Giles
|
2020 | View | What is a Gamer? An exploration of culture, identity and belonging |
Breese, Zwerling, Chiampi
|
2022 | View | Considering Maritime Cybersecurity at a Non-Maritime Education and Training Institution |
Stoker, Greer, Clark, Chiego
|
2018 | View | Partial Credit on Multiple-choice Exams: Does It Help or Hurt Students? |
Moss, Matta, Frost, Chimeli
|
2015 | View | Salient Beliefs in Majoring in Management Information Systems: An Elicitation Study |
Chipidza, Green, Riemenschneider
|
2015 | View | Simulation in Business Education: A Literature Review |
Chircu, Saraswat, Anderson
|
2015 | View | Supply Chain Technology Evaluation: RFID vs. DataMatrix |
Chircu
|
2021 | View | A Full-stack Platform for Teaching Web Application Security
|
Li, Chou, McAllister
|
2017 | View | ACS: Bringing Business Intelligence and Analytics to a Massive Multiplayer Online Gaming Company |
Christian, Akujobi, Saha, Korzaan
|
2024 | View | Information Systems and Cryptocurrency Research: A Text-Analytic Review |
Dasgupta, Chuang, Xue
|
2022 | View | The Gaps between STEM Education and Industry: A Focus Group |
Nguyen, Chung, Liu, Chuaphan, Nam
|
2021 | View | A TA-Like Chatbot Application: ATOB |
Chuaphan, Yoon, Chung
|
2018 | View | The Emergence of Business Analytics in Information Systems from 2011-2018 |
Chudoba, Mills, Fadel
|
2024 | View | CryptoProphet: Building a Cryptocurrency Portfolio App with Integrated Market Predictive Models |
Shewarade, Aly, Yoon, Chung
|
2024 | View | User Experiences in a RAG-Empowered Application |
Kise, Chung
|
2023 | View | An AI-Assisted Cloud-based Web Development: A Case Study of Web Design and Programming |
Kim, Chung
|
2023 | View | Cross-Platform App Development: A Comparative Study of PWAs and React Native Mobile Apps |
Jagatha, Chung, Khamesipour
|
2023 | View | UAVNetAI: An AIOps Approach for Stable Network Connectivity to Enhance Seamless Unmanned Aerial Vehicle Operations in a Metropolitan Area |
Kim, Chung
|
2022 | View | The Gaps between STEM Education and Industry: A Focus Group |
Nguyen, Chung, Liu, Chuaphan, Nam
|
2021 | View | A TA-Like Chatbot Application: ATOB |
Chuaphan, Yoon, Chung
|
2017 | View | Data Analytics Workshop Series for Non-Computing Major First-Generation-College-Bound Students |
Chung
|
2020 | View | Like Playing Whack-a-Mole in the Dark:
Teaching Online during a Pandemic
|
West, Beam, Sosnkowski, Ciampa
|
2019 | View | Speed Mentoring of Information Systems Students: A Multi-Stage Mentorship Model for Improved Recruitment, Retention, Internship and Career Placement of IS/IT Students
|
Citurs
|
2015 | View | On the Development of Assessments of Student Learning in an Introductiory Information Management Course, |
Petkov, Citurs, Grandhi, Kunene
|
2018 | View | Using Jupyter Notebooks and GitHub to Create Explorable Explanations in Python and SAS Classes: Early Experience |
Clapper
|
2015 | View | Experience with Multi-Disciplinary Student STEAM Teams |
Clapper, LaFratta
|
2024 | View | A Study of Software Metrics, Student Learning, and Systems Development Analytics |
Kinnett, Clark
|
2024 | View | Evolution and Challenges of National Efforts in Cybersecurity Education |
Clark
|
2022 | View | Considering Maritime Cybersecurity at a Non-Maritime Education and Training Institution |
Stoker, Greer, Clark, Chiego
|
2021 | View | A Cybersecurity Exercise In Linux:
Student Learning Analysis
|
Clark, Hayne
|
2021 | View | Building/Enhancing a Center of Academic Excellence in Cyber Security |
Serapiglia, Clark
|
2021 | View | Featured Speaker - Lynne Clark, Chief, NSA/DHS National Centers of Academic Excellence in Cyber Defense (CAE-CD) Program Office |
Clark
|
2021 | View | Information Security Outcomes and Summative Assessment for ABET-Accredited IS and IT Programs |
Landry, Clark, Lucas
|
2021 | View | Preparation for a Cybersecurity Apprenticeship Program (PCAP) |
Lancelot, Stoker, Smith, Nichols, Clark, Vetter, Wetherill
|
2021 | View | Proposing the Integrated Virtual Learning Environment for Cybersecurity Education (IVLE4C) |
Greer, Clark, Stoker
|
2020 | View | Building a Cybersecurity Apprenticeship Program: Early-Stage Success and Some Lessons Learned |
Stoker, Clark, Vanajakumari, Wetherill
|
2019 | View | Looking Ahead to CAE-CD Program Changes |
Clark, Stoker, Vetter
|
2019 | View | The Evolving Cybersecurity Curriculum |
Serapiglia, Clark, Yates, Brown
|
2018 | View | A Study of Gender Bias in Grading in the MCIS Program at CSU from 2013 through 2017 |
Clark, Goyal
|
2018 | View | Reflections on Appling for CAE-CDE
Designation
|
Clark, Stoker
|
2017 | View | Cyber Defense Education & A Linux Toolkit |
Wescott, Clark
|
2017 | View | The Enhanced Virtual Laboratory: Extending Cyber Security Awareness through a Web-based Laboratory
|
Black, Chapman, Clark
|
2016 | View | Closing The Gender Gap in the Technology Major |
Jung, Clark, Patterson, Pence
|
2015 | View | A Topic Analysis of ISECON Conference Proceedings from 1982 through 2014 |
Clark, Athey, Plotnicki, Barnes
|
2015 | View | National Cyber League Training and Collegiate Cyber Defense Competitions |
Clark
|
2023 | View | Gamification for Higher Education Business Students |
Williams, Clary, Jenkins
|
2016 | View | The Piranha Solution: Monitoring and |
Ladwig, Schwieger, Clayton
|
2024 | View | Intelligence of AI: Investigating Artificial Intelligence’s Ability to Detect Itself |
Clements, Abegaz, Payne
|
2024 | View | Problematic Smartphone Usage in the TikTok era |
Firth, Johnson, Clouse, Akello
|
2024 | View | Strengthening Incident Response: Lessons from Cybersecurity Tabletop Exercises for Rural Critical Infrastructure |
Haddouch, Clouse, Wright, Floyd, Valgenti, Perry, Gallagher
|
2024 | View | Teaching Case: A Business Intelligence Class Project Combining Business Knowledge, Critical Thinking, and Story-Telling for an Online Retail Store
|
Triche, McDiffett, Firth, Clouse
|
2023 | View | University Student Place Attachment during the Pandemic |
Clouse, Triche, Firth
|
2016 | View | Teaching an Old Dog New Tricks: |
Rossmiller, Lawrence, Clouse, Looney
|
2015 | View | Maximizing Classroom Interaction by Presenting Course Content with Video Podcasts |
Clouse, Clouse, Lawrence
|
2015 | View | Maximizing Classroom Interaction by Presenting Course Content with Video Podcasts |
Clouse, Clouse, Lawrence
|
2022 | View | Building Intercultural Competence in Information Systems Study Abroad |
Cole, Connolly
|
2021 | View | Secrets to the Successful IS Capstone Course |
Connolly, Ezell, Cole
|
2023 | View | Empowering Novice Coders: Integrating Artificial Intelligence Tools in an Introductory Computer Programming Course |
Linville, Combs
|
2018 | View | Linking Programmer Analyst Skills to Industry Needs: A Current Review |
Peslak, Kovalchick, Kovacs, Conforti, Wang, Bhatnagar
|
2024 | View | Birds of a Feather |
Connolly, Mutchler
|
2024 | View | How to Engage Students in Computer Networking and Data Communications |
Connolly, Baker
|
2023 | View | Birds of a Feather: Finding Research Partners |
Connolly, Berardi
|
2023 | View | Fostering Student Identities in Introduction to Programming |
Schmalz, Connolly, Rush
|
2023 | View | ISCAP First Timers Info Meeting |
Connolly, Korzaan, Podeschi
|
2023 | View | Navigating PMI’s New Body of Knowledge in IS Project Management |
Rush, Connolly
|
2022 | View | Birds of a Feather - Find a Research Partner |
Connolly, Mutchler
|
2022 | View | Building an Inclusive Information Systems Program: An Assessment and Expansion of Initial Interventions |
Atkins, Gallagher, Connolly
|
2022 | View | Building Intercultural Competence in Information Systems Study Abroad |
Cole, Connolly
|
2021 | View | An Agile Framework for Teaching with Scrum in the IT Project Management Classroom ** Best JISE Paper (2020) |
Rush, Connolly
|
2021 | View | Beyond Ethics |
Golub, Connolly, Leidig, Lawler
|
2021 | View | Building a Scalable, Platform-Agnostic Relational Database Module for Introduction to MIS |
Mutchler, Lough, Connolly
|
2021 | View | Encouraging Women in an Information Systems Program: an Origin Story |
Connolly, Gallagher, Atkins
|
2021 | View | Fried Tofu and Cats in Boxes:
Teaching Abstract Concepts in Business Analytics
|
Zhong, Connolly
|
2021 | View | Secrets to the Successful IS Capstone Course |
Connolly, Ezell, Cole
|
2020 | View | How to Apply an Agile Framework to InfoSec Management |
Mutchler, Connolly
|
2019 | View | Emotional Intelligence and Alpha Skills for IT Project Management |
Connolly, Rush
|
2018 | View | Cooperative Learning Activities for Introduction to MIS |
Connolly, Rush
|
2017 | View | Practicing the Concept of Fit in a Human-Computer Interaction Classroom Through Paper Prototyping |
Scialdone, Connolly
|
2017 | View | Role of Inclusion and Critical Theory: Rebranding the IS Major for All Students |
Connolly
|
2016 | View | A Creative Approach to Devising Non-Technical, Meaningful Exercises in Human-Computer Interaction Undergraduate Education |
Scialdone, Connolly
|
2016 | View | How to Teach Emotional Intelligence Skills |
Connolly, Reinicke
|
2015 | View | How an Active Learning Classroom Transformed IT Executive Management |
Connolly, Lampe
|
2016 | View | Cloud Data Management – Curriculum Resources for Teaching About Hybrid Cloud |
Conway
|
2015 | View | Strategies and Approaches for Teaching Storage and Data Management – Faculty Perspectives, Insights & Suggestions |
Conway, Kline, Pickard, Royster, Woods, Zullo
|
2015 | View | Using a Flipped Course for 2-year College Outreach |
Breimer, Conway
|
2016 | View | Why Women Choose to Not Major in Information Systems |
Hodges, Corley
|
2023 | View | Empathy-Driven Student Transformations: Bridging the Gap in Software Development for Inclusive User Experiences |
Cotler, Burshteyn, Kiss, Hale, Walker, Slyer
|
2020 | View | Effects of emergency online learning during COVID-19 pandemic on student performance and connectedness |
Boardman, Vargas, Burshteyn, Cotler
|
2016 | View | A mindful approach to teaching |
Cotler, DiTursi, Goldstein, Yates, Del Belso
|
2015 | View | A Real-World-Projects Capstone Course in Computing: A 15-year Experience |
Tappert, Cotoranu, Monaco
|
2016 | View | Teaching Database Management with Automated Grading Technology |
Allen, Ball, Cox, Weber
|
2016 | View | RateMyInformationSystemsProfessor: Exploring the factors that influence student ratings |
Sena, Crable
|
2015 | View | Medical Residents’ Perceptions of an E-Learning Experience |
Segerman, Crable, Brodzinski
|
2024 | View | Automating Disrespect: The Effects of Perceived Bias in Social Media Algorithms |
Craig, Sadovykh
|
2023 | View | Academic Integrity and Rigor in Post-COVID Flexible IS Education |
North, Crandall, Crandall
|
2023 | View | Academic Integrity and Rigor in Post-COVID Flexible IS Education |
North, Crandall, Crandall
|
2015 | View | From Tech Skills to Life Skills: The Google Online Marketing Challenge and Experiential Learning |
Croes, Visser
|
2024 | View | Lab Environments in a Post-VMware World |
Cronin, Ham
|
2024 | View | Remote Protocol Analysis with a Logic Analyzer |
Ham, Zwach, Cronin
|
2023 | View | Classroom GSM Configuration Monitoring and Remediation |
Zwach, Cronin
|
2023 | View | Wireless Networking in a Remote Classroom: A Solution |
Cronin, Zwach
|
2022 | View | Electronic Cyber Badge: An Experiential Teaching Platform for Cybersecurity Concepts |
Ham, Cronin, Halverson
|
2022 | View | Teaching Routing Concepts: The Internet of Strings |
Cronin, Ham
|
2021 | View | IPv6 RPKI Implementation Validator: A Security Utility for BGP Administrators |
Ham, Cronin, Halverson
|
2021 | View | Using Python for teaching 802.11 security and intrusion detection |
Cronin, Ham, Halverson
|
2024 | View | Prescriptive Analytics for Reverse Logistics: A Contemporary Case Study |
Turken, Geda, Cummings
|
2022 | View | It Matters to All of Us - Improving Quality and Reputation for Our Journals |
Witman, Zhang, Schwieger, Hunsinger, Cummings, Serapiglia, Gebauer
|
2021 | View | IS Model Curriculum: Adoption by AACSB Schools and Recommendations for Future Updates
|
Janicki, Cummings
|
2021 | View | Paper-A-Thon |
Cummings, Louch
|
2019 | View | Are Professional Science Master’s (PSM) Programs Beneficial for Graduates?
An Evaluation of PSM Programs
|
Rivenbark, Cummings, Kline, Patterson
|
2019 | View | Teaching Introduction to Database in an Analytics Program |
Kline, Cummings, Lyons
|
2016 | View | Increasing Student / Corporate Engagement |
Janicki, Cummings
|
2015 | View | How secure is education in Information Technology? A method for evaluating security education in IT |
Grover, Reinicke, Cummings
|
2015 | View | Streamlining the Capstone Process: A Time-Saving Approval System For Graduate Theses/Projects |
Grooms, Kline, Cummings
|
2022 | View | AWS Academy as an economical and effective Pedagogy for IT Systems Administration Essentials Course |
Strain, Curtis
|
2021 | View | Analysis of STeM Student Perceptions of a Re-Engineered General Education Program
|
Wolthuis, Curtis, Carlson, Strain, Campbell
|