Conf Year | Article | Title | Authors |
2014 | View | The Information Systems Core: A Study from the Perspective of IS Core Curricula in the U.S. |
Hwang, Ma, Wang
|
2014 | View | The Landscape of Healthcare Informatics Programs in the United States: an Updated Survey |
MacKellar
|
2008 | View | An On-Line Multi-Disciplinary Computer Information Systems Minor: Responding to Declining Enrollments in CIS Majors: |
Russell, Russell, Pollacia, Mai
|
2010 | View | An Analysis of the Ethics of Data Warehousing in the Context of Social Networking Applications and Adolescents |
Louch, Mainier, Frketich
|
2012 | View | The Effects of Contemporary Technologies on Medical Education, Practice, and Management |
Nezlek, Luba, Maino, Friedman
|
2007 | View | Introduction to Computer Forensics: what is it and how does it mesh with Computer Science? |
Malinowski
|
2006 | View | Capstone Projects: Putting the Pieces Together |
Malinowski, Noble
|
2013 | View | Can Web 2.0 Tools Still Provide a Means for Effective Communication and Collaboration? |
Kim, Breese-Vitelli, Homan, Maloney
|
2014 | View | Business Analytics in Practice and in Education: A Competency-based Perspective |
Mamonov, Misra, Jain
|
2010 | View | Virtualization: Providing Better Computing to Universities |
Chawdhry, Mance
|
2012 | View | A Comprehensive Survey on Cyberbullying Perceptions at a Major Metropolitan University – Faculty Perspectives |
Molluzzo, Lawler, Manneh
|
2008 | View | Developing the Cyber Defenders of Tomorrow with Regional Collegiate Cyber Defense Competitions (CCDC) |
Carlin, Manson, Zhu
|
2007 | View | Five Years of Success: Some Outcomes of the Carnegie Mellon Information Assurance Capacity Building Program |
Sledge, Manson, Berta, Tsamitis
|
2012 | View | Common Access Control Terminology Used in |
Marchant
|
2012 | View | Security Engineering Lessons Learned for Migrating Independent LANs to an Enterprise Environment |
Marchant, Bonneau
|
2007 | View | Answering the Need for Information Assurance Graduates: A Case Study of Pennsylvania State University’s Security and Risk Analysis Major |
Marchant, Cole, Chu
|
2006 | View | UML 2 Academic Course – Methodological Background and Survey Benchmarking |
Wrycza, Marcinkowski
|
2007 | View | Security Practices of Students |
Morgan, Lorents, Maris
|
2013 | View | Application of Lean Management Techniques in Support of Improved Online Learning: A Baseline Study of Deterministic Factors Related to Instructional Design and Course Development Efficacy |
Markham, Conn
|
2011 | View | Get your IS students engaged, prepared and ready to succeed with CourseMate! |
Chepelsky, Marsh
|
2014 | View | IT0: Discrete Math and Programming Logic Topics as a Hybrid Alternative to CS0 |
Martin
|
2014 | View | Teaching Non-Beginner Programmers with App Inventor: Survey Results and Implications |
Soares, Martin
|
2012 | View | Building a Cybersecurity Workforce with Remote Labs |
Martin, Woodward
|
2012 | View | Reassessing the Skills Required of Graduates of an Information Systems Program: |
Legier, Woodward, Martin
|
2012 | View | Teaching Introductory Visual Basic Using |
Matthews, Martin, Kline
|
2011 | View | New approaches to student engagement in the Intro IS/MIS course. |
Lang Golub, Martin
|
2011 | View | Teaching Introductory Visual Basic Using MS Team Foundation Server |
Kline, Martin, Matthews, Janicki, Guinn
|
2011 | View | Will They or Won’t They? Exploring Ethical |
Martin, Woodward
|
2010 | View | Expansion and Validation of the PAPA Framework |
Woodward, Martin, Imboden
|
2011 | View | Will Computer Engineer Barbie® impact young women’s career choices? |
Martincic, Bhatnagar
|
2007 | View | Combining Real-World Internships with Software Development Courses |
Martincic
|
2009 | View | Introducing Good Design Principles in an early System Engineering Course |
Pereira, Martinez, Felice, Meliendrez
|
2006 | View | Teaching Effectiveness in Information Systems Courses |
Mashaw
|
2011 | View | Enterprise Architecture – An Analysis of IS 2010’s Newest Core Course |
Schell, Mathieu
|
2011 | View | IS 2010 & ABET Accreditation: Perspectives and Issues on the Current Iteration |
Saulnier, Kasper, Mathieu, Murray, White
|
2008 | View | Introductory Course Improves Retention, Especially for Women |
Mathis
|
2010 | View | Exploring Impact of Self-selected Student Teams and Academic Potential on Satisfaction |
Matta, Luce, Ciavarro
|
2012 | View | Teaching Introductory Visual Basic Using |
Matthews, Martin, Kline
|
2011 | View | Teaching Introductory Visual Basic Using MS Team Foundation Server |
Kline, Martin, Matthews, Janicki, Guinn
|
2013 | View | Educational Software for First Order Logic Semantics in Introductory Logic Courses |
Mauco, Ferrante, Felice
|
2009 | View | Clausula: A Didactic Tool to Teach First Order Logic |
Mauco, Ferrante
|
2010 | View | Beyond Introductory Programming: Success Factors for Advanced Programming |
Hoskey, Maurino
|
2008 | View | Writing to Learn and Writing in the Disciplines: Enhancing Computer and Technical Classes |
Maurino
|
2007 | View | Technical Classes Online: A Different Breed of Learning? |
Maurino, Federman, Greenwald
|
2007 | View | Changes in the Systems Analysist Skill set: 2006 versus 2001 |
Haga, Morris, Mawhinney, Morrell
|
2013 | View | A Study of E-Readiness Assessment: The Case of Three Universities in Nigeria |
Eweni, Meyinsse, Mbarika, Okpechi
|
2014 | View | Internet Addiction Risk in the Academic Environment |
Ellis, McAleer, Szakas
|
2013 | View | Interdisciplinary IT: An Expanded Approach |
Fahy, McAleer, Precourt, Szakas
|
2010 | View | Lessons of Technical Disasters and Project Management |
McAleer, Szakas
|
2009 | View | Accounting for Systems Analysts in the 21st Century |
Giordano, McAleer, Szakas
|
2008 | View | Myth busting: Using Data Mining to Refute Link between Transfer Students and Retention Risk |
McAleer, Szakas
|
2007 | View | Forces for Change in the New IS 20xx Curriculum |
McAleer, Szakas
|
2006 | View | Cutting to the Core: Curriculum Strategies to Address Outsourcing |
McAleer, Szakas
|
2013 | View | Students Perception of Social Media as a Course Tool |
McCarthy, McCarthy
|
2013 | View | Students Perception of Social Media as a Course Tool |
McCarthy, McCarthy
|
2012 | View | Why IT Education Matters: A Preliminary Study of the Value of an Information Systems Education |
McCarthy
|
2007 | View | The Development of a Comprehensive Assessment Plan: One Campus’ Experience |
White, McCarthy
|
2009 | View | IT Still Bytes: Mainframes in IS Education |
Murphy, Sharma, Seay, McClelland
|
2008 | View | Computer Lab to Go: A "Cloud" Computing Implementation |
Murphy, McClelland
|
2006 | View | The Value of a Project-Based Approach to Teaching Electronic Commerce in MBA Programs |
Kakish, McCord
|
2010 | View | An Information Systems Project Management Course Using a Service-Learning Model |
McCoy, Wymer
|
2014 | View | Coastal Pacific Doctor Associates: Implementation of a Purchased System |
Schwieger, McDonald
|
2006 | View | Scientific Inquiry-Theory Construction: A Primer |
McDonald, Schneberger
|
2012 | View | Assessing the Microsoft Office Skills Course: Computer-Mediated Delivery and Pre-and Post-Surveys |
Carpenter, McGinnis, Slauson, Snyder
|
2009 | View | Developing a Smart Phone MBA Program |
McGraith, White
|
2014 | View | Cryptocurrencies: Technology Empowered Integration of Information Systems Enabling Currency Without Borders |
Serapiglia, Serapiglia, McIntyre
|
2012 | View | Closing the Gap: Making Decisions based on data from the ISA Exam |
White, Rosenthal, Hilton, McKell
|
2011 | View | A Tool for Program Review, Assessment and Accreditation: The Information Systems Assessment Test |
McKell, Kasper, White, Dhariwal, Hilton
|
2010 | View | IS2010 Model Curriculum Core Assessment Examination – Supporting Institutional and Professional Development |
McKell, White, Dhariwal, Hilton
|
2007 | View | AITP Sponsored Enhancements to the Information Systems Model Curriculum |
Longenecker, Leidig, McKell, Reichgelt, Russell, Waguespack, Landry, Wagner, White
|
2006 | View | Introductory Programming with ALICE as a Gateway to the Computing Profession |
McKenzie
|
2010 | View | The 2010 CIS Baccalaureate Degree Compared with IS 2010 Guidelines |
Pauli, Halverson, McKeown
|
2007 | View | Creating a Real-World Capstone Experience for I.T. Management Students: Putting Theory into Practice |
Grant, McLaren
|
2013 | View | Teaching Programming Style with Ugly Code |
McMaster, Sambasivam, Wolthuis
|
2012 | View | Relational Algebra and SQL: Better Together |
McMaster, Sambasivam, Hadfield, Wolthuis
|
2012 | View | Software Engineering Frameworks: Life Cycle Changes |
McMaster, Sambasivam, Wolthuis
|
2011 | View | Problem Solving Frameworks for Mathematics and Software Development |
McMaster, Sambasivam, Blake
|
2011 | View | Software Engineering Frameworks: Textbooks vs. Student Perceptions |
McMaster, Hadfield, Wolthuis, Sambasivam
|
2010 | View | A Relational Algebra Query Language |
McMaster, Sambasivam, Anderson
|
2010 | View | Integrating Health Information Systems Into a Database Course: A Case Study |
Anderson, Zhang, McMaster
|
2009 | View | A Probability Model for Belady's Anomaly |
McMaster, Sambasivam, Anderson
|
2008 | View | Three Software Development Gestalts |
McMaster, Rague, Hadfield, Anderson
|
2008 | View | Two Frameworks for Discrete Mathematics |
McMaster, Rague, Hadfield
|
2007 | View | Two Gestalts for Mathematics: Logical vs. Computational |
McMaster, Rague, McMaster, Blake
|
2007 | View | Two Gestalts for Mathematics: Logical vs. Computational |
McMaster, Rague, McMaster, Blake
|
2006 | View | Teaching Relational Algebra and Relational Calculus: |
McMaster, Anderson, Blake
|
2012 | View | Mobile technologies, social media, and crowdsourcing: how students get their local news |
Breese-Vitelli, McMillion, Vitelli
|
2009 | View | Knowledge Management Using Weblogs in Information Technology Education |
Lee, Shah, Mehta
|
2007 | View | An IT Compliance Course Emphasizing Information System Design and Software Testing |
Mehta, Lee, Shah
|
2006 | View | Service Oriented Architecture:Concepts and Implementation |
Mehta, Lee, Shah
|
2010 | View | Exploring the Connection between Age and Strategies for Learning new Technology Related Tasks |
Meiselwitz, Chakraborty
|
2009 | View | Introducing Good Design Principles in an early System Engineering Course |
Pereira, Martinez, Felice, Meliendrez
|
2010 | View | Developing Information Systems Education in a Network – Lessons Learned from a R&D Project |
Melin, Axelsson
|
2010 | View | How to Use the Potential of Learning Outcomes in IS Courses – Listening to the Voices of Students |
Axelsson, Melin
|
2010 | View | Towards a Model for Learning Outcomes |
Wedlund, Axelsson, Melin
|
2009 | View | Learning Outcomes in Use |
Wedlund, Axelsson, Melin
|
2006 | View | Project Based Learning – An Emergent Framework for Designing Courses |
Melin, Axelsson, Wedlund
|
2006 | View | Project Oriented Student Work |
Cronholm, Melin
|
2008 | View | Issues and Challenges for Selecting a Programming Language in a Technology Update Course |
Ali, Mensch
|
2009 | View | Tracking Women and Minorities as They Attain Degrees in Computing and Related Fields |
Sorkin, Gore, Mento, Stanton
|
2006 | View | Encouraging Women and Minorities to Attain Degrees in Computing and Related Fields |
Mento, Sorkin, Prettyman
|
2014 | View | What's the Price of Privacy? A Study of the Perceptions of College Students and Industry Professionals on the Costs of Information Privacy |
Kim, Metzer, Agnor, Homan, Breese
|
2014 | View | Improving an Information Systems Capstone/Consulting Course for Non-Traditional Undergraduate Students |
Mew
|
2013 | View | A Study of E-Readiness Assessment: The Case of Three Universities in Nigeria |
Eweni, Meyinsse, Mbarika, Okpechi
|
2014 | View | Aligning Academic Curricula to Industrial Needs |
Omar, Miah, Nkabyo
|
2014 | View | Using Facebook for Course Delivery |
Miah, Omar, Karadeniz
|
2013 | View | A Digital Ecosystems Approach to Biological Ecosystem Simulation Model Fit Optimization |
Debuse, Miah, Debuse, Lawson
|
2013 | View | Developing a Campus Social Website for Buying, Selling, and Trading Textbooks |
Miah, Omar, Sagiroglu
|
2013 | View | Digital Evolution of the Written Language |
Omar, Miah
|
2012 | View | Effects of Social Networking on Adolescent Education |
Miah, Omar, Allison
|
2011 | View | Digital Age: Technology Progress in Developing Countries |
Miah, Omar
|
2010 | View | Selecting a Good Conference Location based on Participants’ Interests |
Miah
|
2011 | View | Whatever Happened to Richard Reid’s List of First Programming Languages? |
Siegfried, Greco, Miceli, Siegfried
|
2013 | View | The Google Online Marketing Challenge: |
Miko
|
2010 | View | Taking it to the Top: |
Frydenberg, Miko
|
2006 | View | Capstone Project Experiences: Integrating Computer Science & the Liberal Arts |
Miles, Kelm
|
2010 | View | Class Service Quality: Moving Beyond SERVQUAL |
Miller, Brooks
|
2008 | View | Enhancing American K-12 Technology Education to a Global Standard |
Miller, Iyer
|
2014 | View | USMCo Payroll System |
Cohill, Dudley, Gregg, Millette, Zinnecker, Havelka
|
2008 | View | Software Plagiarism in Undergraduate Programming Classes |
Abraham, Milligan
|
2006 | View | Online Content Editing - An Evaluation and Comparative Study |
Sambasivam, Mills
|
2012 | View | Reflecting on Religious Principles for Teaching Ethical Values in an E-Business Course |
Mirza
|
2007 | View | Students’ Perceived Barriers to In-Class Participation in a Distributed and Gender Segregated Educational Environment |
Mirza
|
2014 | View | Understanding IT Change Management Challenges at a Financial Firm |
Pandey, Mishra
|
2013 | View | Gender Rationales and Success Factors in Assessing and Selecting a Major in Information Technology at the Undergraduate Level of a University Program: A Focus Group Approach |
Mishra, Draus, Caputo, Leone, Kohun, Repack
|
2014 | View | Business Analytics in Practice and in Education: A Competency-based Perspective |
Mamonov, Misra, Jain
|
2014 | View | A Perception Study of Bullying Prevalence in the Information Systems Profession |
Lawler, Molluzzo
|
2014 | View | A Proposed Concentration Curriculum Design for Big Data Analytics for Information Systems Students |
Lawler, Molluzzo
|
2013 | View | A Comparison of Faculty and Student Perceptions of Cyberbullying |
Molluzzo, Lawler
|
2012 | View | A Comprehensive Survey on Cyberbullying Perceptions at a Major Metropolitan University – Faculty Perspectives |
Molluzzo, Lawler, Manneh
|
2011 | View | A Study of the Perceptions of College Students on Cyberbullying |
Molluzzo, Lawler
|
2011 | View | An Expanded Study of Net Generation Perceptions on Privacy and Security on Social Networking Sites (SNS) |
Molluzzo, Lawler, Doshi
|
2008 | View | An Expanded Study of Integrating Issues of Location-Based Privacy with Mobile Computing Into General Curriculum of Universities |
Molluzzo, Lawler
|
2007 | View | Implementing Ethical and Legal Issues in an ABET Accredited IS Programs |
Molluzzo, Farkas
|
2007 | View | Integrating Issues of Location-Based Privacy with Mobile Computing Into International Information Systems Curricula |
Lawler, Molluzzo
|
2006 | View | Gender and Technology Careers: The Gap Continues |
Molluzzo, Dwyer
|
2013 | View | Enterprise Systems: A Measure of Student Learning |
Kreie, Mora-Monge, Shannon
|
2010 | View | An Enterprise System and a Business Simulation |
Kreie, Shannon, Mora-Monge
|
2009 | View | Going from data to decisions: Preparing |
Kreie, Mora-Monge, Shannon
|
2009 | View | Computers for Humanity: A Service Learning Approach to Computer Education |
Pauli, Podradsky, Pauli, Moran
|
2013 | View | A traditional school towards a new dimension – social learning |
Ferreira, Moreira, Seruca
|
2012 | View | Exploring Integration Issues in A Blended Mobile Learning Model context oriented applied to a Requirement Engineering course – Mobility, Context And Cloud |
Moreira, Ferreira
|
2011 | View | Is Student Performance On The Information Sys-tems Analyst Certification Exam Affected By Form Of Delivery Of Information Systems Coursework? |
Haga, Moreno, Segall
|
2007 | View | Security Practices of Students |
Morgan, Lorents, Maris
|
2007 | View | Agile Software Development Methods Curriculum in Thailand – A Survey of Thai Universities |
Morien, Tetiwat
|
2010 | View | An Improved Database System for Program Assessment |
Haga, Morris, Morrell
|
2009 | View | Measuring the Value Added to |
Segall, Lege, Morrell
|
2008 | View | A Database System for IS Curriculum Assessment using ISA Examination Performance |
Segall, Ghosh, Morrell
|
2007 | View | Changes in the Systems Analysist Skill set: 2006 versus 2001 |
Haga, Morris, Mawhinney, Morrell
|
2006 | View | The Information Systems Analyst National Assessment Exam: Factors for Success |
Segall, Gollhardt, Morrell
|
2013 | View | WorkLight - A New Paradigm in Mobile Application Development |
Laverty, Morris
|
2011 | View | Preparing for a Career as a Network Engineer |
Morris, Fustos, Haga
|
2010 | View | An Improved Database System for Program Assessment |
Haga, Morris, Morrell
|
2008 | View | Interdisciplinary Introductory Course in Bioinformatics |
Kortsarts, Morris, Utell
|
2007 | View | Changes in the Systems Analysist Skill set: 2006 versus 2001 |
Haga, Morris, Mawhinney, Morrell
|
2014 | View | A Model for Establishing a Cybersecurity Center of Excellence |
Moskal
|
2008 | View | Computer Security Implementation Roadmap - How to Implement Computer Security |
Moskal
|
2007 | View | Adding Robotics to your Computer Science Curriculum |
Moskal
|
2007 | View | Implementation Of Distance Learning |
Moskal
|
2006 | View | A Case Study: Developing an Architectural Description for the Technology-Communications Engineering Viewpoint |
Steenkamp, Sabri Alomari, Mousa Basal , Kakish
|
2010 | View | Creating and Using a Computer Networking and Systems Administration Laboratory Built Under Relaxed Financial Constraints |
Conlon, Mullins
|
2014 | View | Cybersecurity Curriculum Development: Introducing Specialties in a Graduate Program |
Bicak, Liu, Murphy
|
2013 | View | Assessing Face to Face and Online Course Delivery using Student Learning Outcomes |
Sharma, Bryant, Murphy
|
2013 | View | Document Explosion in the World of Big Data – Curriculum Considerations |
Liu, Murphy
|
2012 | View | Developing an Undergraduate Information Systems Security Track |
Sharma, Murphy, Rosso, Grant
|
2012 | View | Using Mobile Apps to Entice General Education Students into Technology Fields |
Liu, Murphy
|
2011 | View | Fusing Communication and Writing Skills in The 21st Century’s IT/IS Curricula |
Liu, Murphy
|
2011 | View | Measuring Assurance of Learning Goals: |
Murphy, Sharma, Rosso
|
2010 | View | Teach or No Teach: Is Large System Education Resurging? |
Sharma, Murphy
|
2009 | View | IT Still Bytes: Mainframes in IS Education |
Murphy, Sharma, Seay, McClelland
|
2008 | View | Computer Lab to Go: A "Cloud" Computing Implementation |
Murphy, McClelland
|
2011 | View | IS 2010 & ABET Accreditation: Perspectives and Issues on the Current Iteration |
Saulnier, Kasper, Mathieu, Murray, White
|
2009 | View | The Role of Technical Support in Updating Web Design Courses - A Case Example |
Ali, Murthy
|
2007 | View | Web Development in the Graduate IS Curriculum: |
Farkas, Murthy
|