Conf Year | Article | Title | Authors |
2022 | View | Rebranding IS/IT Management Programs: The Case of Business Technology Management (BTM) in Canada |
Gagnon
|
2024 | View | Strengthening Incident Response: Lessons from Cybersecurity Tabletop Exercises for Rural Critical Infrastructure |
Haddouch, Clouse, Wright, Floyd, Valgenti, Perry, Gallagher
|
2022 | View | Building an Inclusive Information Systems Program: An Assessment and Expansion of Initial Interventions |
Atkins, Gallagher, Connolly
|
2021 | View | Encouraging Women in an Information Systems Program: an Origin Story |
Connolly, Gallagher, Atkins
|
2016 | View | Developing and Hosting Multimedia Instructional Modules in the Cloud |
Ganesan
|
2022 | View | The influence of gamified cybersecurity labs on Student’s motivation and learning |
Ganiga, Zhong, Liu, Kim
|
2024 | View | Training Data-Savvy Managers: An Analysis of Graduate Business Analytics Programs |
Nosrati, Burns, Gao, Sherman
|
2017 | View | Do the Knowledge and Skills Required By Employers of Recent Graduates of Undergraduate Information Systems Programs Match the Current ACM/AIS Information Systems Curriculum Guidelines? |
Burns, Gao, Sherman, Klein
|
2016 | View | An Empirical Investigation into the Advantages and Disadvantages of Combining Information Systems and Operations Management into One Department |
Burns, Gao, Sherman, Klein
|
2024 | View | Teaching Software Supply Chain Security |
Li, Yuan, Garcia
|
2024 | View | Workshop: Process Mining in Action with pm4py - From Data to Insights |
Gardiner
|
2024 | View | Using Python to Inspire Novice Cybersecurity Learners (K-12 and University Level) |
Breese, Gardner
|
2022 | View | Using GitLab for Education program for a collaborative Cyber Infrastructure among Cybersecurity educators, learners, and researchers across the Pennsylvania State University Commonwealth Campuses |
Landmesser, Breese, Roshanaei, Gardner
|
2021 | View | A journey through shared cyber program development to student-centered education and opportunities |
Breese, Landmesser, Gardner
|
2023 | View | Analytics for an Audience of Healthcare Professionals: Curriculum Design and Student Perceptions |
Xu, Garfield
|
2022 | View | The Easy Button: A Hands-on Workshop on Utilizing Microsoft Azure to Teach High-Demand Skills |
Garriga , Froehlich
|
2024 | View | Investigating the Potential of Virtual Reality
Medium for Collaborative Work: Results from a Series of Pilot Studies
|
Javadi, Gebauer, Jung
|
2024 | View | The Role of Trust in AI Integration in Education: Factors, Issues, and Strategic Approaches
|
Buyck, Shi, Gebauer
|
2023 | View | Applications Of Multidimensional Scaling With Co-plot Analysis
|
Poosapati, Gebauer, Shi, Song
|
2023 | View | Internet of Things and Machine Learning Competencies in IS Curricula: The Case for Incremental Evolution of Core Courses |
Javadi, Gebauer, Tunberg
|
2023 | View | Teaching Systems Analysis – Best Practices and a Look Into the Future |
Gebauer, Sibona, Topi, Spurrier, Javadi, Tanner
|
2022 | View | Flipped Classrooms & Project Dojos for Enhancing Peer-Learning in Classrooms |
Javadi, Gebauer, Tanner
|
2022 | View | It Matters to All of Us - Improving Quality and Reputation for Our Journals |
Witman, Zhang, Schwieger, Hunsinger, Cummings, Serapiglia, Gebauer
|
2022 | View | Using Co-plot Method to Explore IS/IT Concentrations in Top-Ranked MBA Programs in the U.S.: A Work-in-progress Study |
Shi, Gebauer
|
2021 | View | Infusing Artificial Intelligence in IS Curriculum through Service-Learning: A Summary of Pilot Programs |
Javadi, Gebauer, Antink-Meyer, Darner
|
2018 | View | Mixed-Approach Social Comparison for Improving Online Discussion Efficacy: Insights from Field Experiments |
Javadi, Gebauer, Novotny
|
2016 | View | Comparing Student Interaction in Asynchronous Online Discussions and in Face-to-Face Settings:
A Network Perspective
|
Javadi, Gebauer, Novotny
|
2024 | View | Prescriptive Analytics for Reverse Logistics: A Contemporary Case Study |
Turken, Geda, Cummings
|
2021 | View | Exploratory Study of Lecture Approaches on Data Analytics Tools at Business Schools |
Perez Lespier, Geda, Singh, Turken
|
2023 | View | WWC: Leveraging Extreme Events in Teaching |
George, Aasi
|
2019 | View | Cognitive Apprenticeship: Teaching Students How to Think Like an Expert |
Gomillion, George, Scialdone, Becker
|
2019 | View | Learning How to Teach: The Case for Faculty Learning Communities |
Gomillion, Becker, George, Scialdone
|
2015 | View | An Innovative Approach to Teaching Information Systems |
Gessell, Brandenburg
|
2024 | View | Applying Design Science to RPA and AI-Based Systems |
Ghosh
|
2018 | View | Closing the Deal amidst Falling Customer Satisfaction |
Ghosh
|
2017 | View | Effectively Acquiring and Demonstrating Spreadsheet Proficiency |
Gibson
|
2020 | View | What is a Gamer: An exploration of culture, identity, and belonging? |
Breese, Chiampi , Bayer, Giles
|
2024 | View | The Impact of Continuous Learning on Service Quality and Information Quality: The Moderating Effect of System Quality |
Masialeti, Vrooman, Moon, Glascoe, Hossain, Wang
|
2022 | View | Cloud Tools for Teaching IT |
Gokce
|
2023 | View | Manipulating the Real World in an Introduction to Computer Science Course |
Goldstein
|
2021 | View | Not Just Another List: Increasing Student Engagement Using Innovative Apps |
Louch, Goldstein, Podeschi, Korzaan
|
2018 | View | What! No GUI? – Teaching A Text Based Command Line Oriented Introduction to Computer Science Course |
Goldstein
|
2016 | View | A mindful approach to teaching |
Cotler, DiTursi, Goldstein, Yates, Del Belso
|
2024 | View | New and Forthcoming Changes in IS Education: Let’s Talk! |
Golub
|
2023 | View | What’s Happening at Prospect Press |
Williams, Golub
|
2022 | View | Teaching Python Programming with Animation and Analogies |
Groner, Golub
|
2021 | View | Beyond Ethics |
Golub, Connolly, Leidig, Lawler
|
2021 | View | Successful Strategies for Writing a Textbook |
Golub
|
2021 | View | What’s Happening at Prospect Press |
Golub
|
2020 | View | Prospect Press Recent and Forthcoming Textbooks |
Golub
|
2019 | View | Improving IS Student Decisions: A Framework for Debiasing IS Projects |
Drake, Golub
|
2016 | View | Teaching Intro IS with a Learner-Centered, Experiential Approach |
Golub, Van Slyke
|
2024 | View | Conquer the Cloud: Effectively Using the Amazon Web Services Academy Learner Lab for Information Systems Education |
Strain, Marquardson, Gomillion
|
2019 | View | Cognitive Apprenticeship: Teaching Students How to Think Like an Expert |
Gomillion, George, Scialdone, Becker
|
2019 | View | Learning How to Teach: The Case for Faculty Learning Communities |
Gomillion, Becker, George, Scialdone
|
2018 | View | Simulation for Network Education: Transferring Networking Skills Between Simulated to Physical Environments |
Marquardson, Gomillion
|
2017 | View | Cyber Security Exercise Development: Protecting Your Institution While Giving Students Experience |
Marquardson, Gomillion
|
2016 | View | The Role of IT Industry Certifications in an AACSB-Accredited Institution |
Gomillion
|
2021 | View | Cyber Threats on IoT and AI assisted Digital Learning Environments |
Bajracharya, Gondi
|
2021 | View | Experience of Teaching Defensive Cybersecurity in Hybrid Mode |
Gondi, Hua
|
2021 | View | Skills Infusion in Information Technology Education |
Hua, Davison, Gondi
|
2020 | View | Assessing AWS and Traditional Cluster-Based Learning Outcomes in an Information Technology Classroom |
Gondi, Hua, Bajracharya
|
2020 | View | IoT Education using Learning Kits of IoT Devices |
Bajracharya, Gondi, Hua
|
2019 | View | Engaging students in cybersecurity through co-curricular student organization participation |
Gondi, Hua, Bajracharya
|
2019 | View | Engaging students in learning Public Key Cryptography |
Gondi
|
2024 | View | When to use ChatGPT: An exploratory development of a 2x2 Matrix Framework |
Firth, Gonzales, Louch, Hammer
|
2015 | View | Cyber Security Day: Creating a Mock Cyber Competition Event to Increase Student Interest in Cyber Security |
Imboden, Martin, Woodward, Wood, Goodman
|
2024 | View | Updates on ABET Accreditation Criteria for IS Programs |
Gorka, Jacobson, Leidig
|
2015 | View | The Loose Bolt On: Implementation Issues at CPC |
Aldrich, Francus, Goteti, Lee, Tonski, Havelka
|
2024 | View | Improving Public Speaking through Virtual Reality |
Gouws, Case, Rogalski
|
2018 | View | A Study of Gender Bias in Grading in the MCIS Program at CSU from 2013 through 2017 |
Clark, Goyal
|
2023 | View | The Status Quo of Australia's FinTech Education and Training |
Poon, Wibowo, Grandhi, Tang
|
2015 | View | On the Development of Assessments of Student Learning in an Introductiory Information Management Course, |
Petkov, Citurs, Grandhi, Kunene
|
2019 | View | Developing an Electronic Resume Analyzer Portal (e-RAP): A Natural Language Processing Approach to Enhance College Graduates Job Readiness |
Green, Liu, Murphy
|
2017 | View | Server on a USB Port:
A custom environment for teaching systems administration using the Raspberry Pi Zero |
Black, Green
|
2015 | View | Salient Beliefs in Majoring in Management Information Systems: An Elicitation Study |
Chipidza, Green, Riemenschneider
|
2017 | View | Diversity in Information Systems: Increasing Opportunities in STEM for Capable Students with Developmental and Intellectual Disabilities |
Lawler, Joseph, Greene
|
2022 | View | Considering Maritime Cybersecurity at a Non-Maritime Education and Training Institution |
Stoker, Greer, Clark, Chiego
|
2021 | View | Proposing the Integrated Virtual Learning Environment for Cybersecurity Education (IVLE4C) |
Greer, Clark, Stoker
|
2019 | View | Flattening the Data: Understanding Multi-Table Databases from the Perspective of a Two-Dimensional Spreadsheet |
Grenci
|
2015 | View | Will Simulation Software Facilitate Case Analysis? |
Griffin
|
2022 | View | Teaching Python Programming with Animation and Analogies |
Groner, Golub
|
2015 | View | Streamlining the Capstone Process: A Time-Saving Approval System For Graduate Theses/Projects |
Grooms, Kline, Cummings
|
2015 | View | How secure is education in Information Technology? A method for evaluating security education in IT |
Grover, Reinicke, Cummings
|
2017 | View | Administrative or Faculty Control of Online Course Development and Teaching: A Comparison of Three Institutions |
Tannehill, Serapiglia, Guiler
|
2018 | View | Storing and Querying Bitcoin Blockchain Using SQL Databases |
Yue, Chandrasekar, Gullapalli
|
2021 | View | Bridging Cognitive Load and Self-regulated Learning: A meta-UTAUT Perspective |
Guo, Wang
|
2024 | View | Use of a Retrieval-Augmented Generation (RAG) Chatbot in an Online R Programming Course |
Lang, Gurpinar
|
2024 | View | A Review of Blockchain Technology Programs in Higher Education |
Gürpinar, Verma, Leonard, Jones, Ceccucci
|