Conf Year | Article | Title | Authors |
2021 | View | Instructional Modes for the New Normal:
In-Class, Synchronous or Asynchronous?
|
Matta, Palvia
|
2024 | View | A UTAUT-based analysis of the Adoption Factors of Student Evaluations of Teaching |
Caporusso, Doan, Acharya, Pandit, Shrestha, Le, Khatri, Pond
|
2024 | View | From Angry Reviews to Classroom Success: Using LLMs to Synthesize RateMyProfessors.com Data |
Caporusso, Doan, Acharya, Pandit, Shrestha, Khatri, Pond, Le
|
2021 | View | A Framework for the Sudden Switch to Remote and Online Teaching |
Popovich, Pangborn
|
2017 | View | A Tribute to Bart Longenecker: An IS Education Maverick and Visionary |
Landry, Pardue, Daigle
|
2017 | View | Adoption of video lectures for learning – content quality and gender difference |
Park, Kim, Han
|
2023 | View | Examining Impacts on Digital Discrimination, Digital Inequity and Digital Injustice in Higher Education: A Qualitative Study |
Parks, Paros, Yakubu
|
2020 | View | Discussion: Integrating Analytics into the Information Systems Curriculum |
Parks
|
2020 | View | Interdisciplinary Evaluation of Big Data Analytics in Healthcare: A Systematic Literature Review |
Parks, Dong
|
2019 | View | A Pedagogic Experience in Designing a Healthcare Analytics Course: A Contextual Active Learning Approach
|
Parks
|
2019 | View | From Data Preparation to Visual Exploration and Insight Generation: A Data Analytics Case |
Parks
|
2017 | View | Flipping The Classroom: A Case of a Graduate Business Analytics Course |
Parks
|
2017 | View | Harnessing Business Analytics: Analyzing Data Analytics Programs in U.S. Business Schools |
Parks, Ceccucci, McCarthy
|
2016 | View | Understanding Business Analytics Success and Impact: A Qualitative Study |
Parks, Thambusamy
|
2015 | View | Information Security Breaches: |
Parks, Adams
|
2015 | View | Scholar’s Academy Cafeteria Database: A Teaching Case Study |
Parks, Hall
|
2023 | View | Examining Impacts on Digital Discrimination, Digital Inequity and Digital Injustice in Higher Education: A Qualitative Study |
Parks, Paros, Yakubu
|
2022 | View | Enhancing Learning in Business Education |
Fullick-Jagiela, Kelly, Paros, Awudu, Riello
|
2024 | View | The Rapid Rise of Generative AI Adoption among College Students
|
Frydenberg, Mentzer, Patterson
|
2024 | View | The Virtual Stage: Metaverse Integration in Effective Speaking Courses |
Patterson, Temple, Anderson, Rogalski, Mentzer
|
2023 | View | Are Tech Savvy Students Tech Literate?
Digital and Data Literacy Skills
of First-Year College Students
|
Mentzer, Frydenberg, Patterson
|
2019 | View | Are Professional Science Master’s (PSM) Programs Beneficial for Graduates?
An Evaluation of PSM Programs
|
Rivenbark, Cummings, Kline, Patterson
|
2016 | View | Closing The Gender Gap in the Technology Major |
Jung, Clark, Patterson, Pence
|
2024 | View | Detecting AI-Generated Writing Using GPTZero |
Paullet, Pinchot, Kinney, Stewart
|
2023 | View | Mobile Technology Has Changed Our Culture |
Paullet, Pinchot
|
2021 | View | The COVID-19 Pandemic Impact on Course Grades: A Remote Learning Analysis |
Chawdhry, Paullet, Baugh, Nakama
|
2021 | View | The Impact of Choice Theory on Student Outcomes in Online Courses |
Paullet, Pinchot
|
2020 | View | Using Student Choice in Assignments to Create a Learner-Centered Environment for Online Courses |
Pinchot, Paullet
|
2019 | View | CIS Cyber Scholars: An NSF Funded Initiative to Broaden Participation of Community College Transfer Students in Computer and IT Careers. |
Igoche, Paullet, Bromall
|
2019 | View | Student Perceptions of Challenges and Role of Mentorship in Cybersecurity Careers: Addressing the Gender Gap |
Pinchot, Cellante, Mishra, Paullet
|
2018 | View | E-Learning Early Admit College Program: A Case Study of Recruiting and Retaining High School Underrepresented Students in Cybersecurity |
Nakama, Paullet, Haynes, Yamanuha
|
2017 | View | The Urgency for Innovation: A Case Study on Cybersecurity Education Convergence of High School and Higher Education in Rural Communities |
Nakama, Paullet
|
2016 | View | A Hands-On Approach to Teaching Mobile Forensics |
Paullet
|
2016 | View | Mobile Forensics and Security Certificate: An Addition to a Cyber Security Degree |
Paullet, Pinchot, Mishra
|
2015 | View | Assessing Faculty Perceptions and Techniques to Combat Academic Dishonesty in Online Courses |
Paullet, Chawdhry, Douglas, Pinchot
|
2015 | View | Mobile Forensic Security Training: what should be covered and how to teach? |
Paullet, Kohun
|
2024 | View | Intelligence of AI: Investigating Artificial Intelligence’s Ability to Detect Itself |
Clements, Abegaz, Payne
|
2023 | View | Truth or Media: Fallacies of Perceived Cyber Attribution |
Abegaz, Payne, Robertson
|
2015 | View | Preparing Students for a Capstone Design Course |
Ball, Sanchez, Payne
|
2019 | View | Adopting Competency Mindful of Professionalism in Baccalaureate Computing Curricula |
Waguespack, Topi, Frezza, Babb, Marshall, Takada, van der Veer, Pears
|
2022 | View | Creating a Successful Full Stack Course for Beginning Students |
Anderson, Wilson, Pectol
|
2019 | View | Smart Interactive Resources for Microsoft/Database/SQL/Business Computing Concepts/Data Analytics |
Pectol, Wilson
|
2018 | View | Principles of Program Revision for Computing Degrees: A Data-Driven 360 Degree Program Review Model |
Peltsverger, Li, Rutherfoord
|
2016 | View | Closing The Gender Gap in the Technology Major |
Jung, Clark, Patterson, Pence
|
2023 | View | TikTok & The Art of War: A Qualitative Analysis of US Strategic Maneuvering Against Chinese Social Media Company ByteDance |
Pendergrass
|
2017 | View | Red Hat Academy: Bridging the Gap Between Industry and Education |
Turlington, Penny
|
2016 | View | Raising the Bar: Challenging Students in a Capstone Project Course With an Android and Mobile Web Parallel Development Team Project |
Wong, Pepe, Englander
|
2021 | View | Exploratory Study of Lecture Approaches on Data Analytics Tools at Business Schools |
Perez Lespier, Geda, Singh, Turken
|
2016 | View | Taking the High Road: Privacy in the Age of Drones |
Hamilton, Harrington, Lawrence, Perot, Studer
|
2024 | View | Strengthening Incident Response: Lessons from Cybersecurity Tabletop Exercises for Rural Critical Infrastructure |
Haddouch, Clouse, Wright, Floyd, Valgenti, Perry, Gallagher
|
2024 | View | Navigating the AI Landscape: An Analysis of AI Developer Tools Usage, Sentiment, and Trust Among IT Professionals |
Ceccucci, Peslak, Jones
|
2023 | View | Investigating the Relationship between Developer Job Satisfaction and Life Satisfaction: A Global Analysis |
Peslak, Ceccucci, Jones, Leonard
|
2023 | View | Social Media Users Only Have Two Clusters: A United States Analysis |
Peslak, Kovalchick, Menon
|
2023 | View | Using Social Network Analysis to Analyze Student Interactions in an Online Asynchronous Course |
Menon, Kovalchick, Peslak
|
2022 | View | Onliners versus On-grounders in Higher Education: A Two-Step Cluster Analysis |
Peslak, Kovalchick, Wang, Kovacs
|
2021 | View | The COVID-19 Effect: Have Students Changed Perceptions on Online Education? |
Peslak, Wang, Kovacs, Kovalchick
|
2020 | View | Effectiveness of Educational Delivery Modes: A Study in Computer Information Systems |
Peslak, Kovalchick, Kovacs, Wang
|
2018 | View | A Sentiment and Linguistic Analysis of Online Reviews of Online Universities |
Peslak
|
2018 | View | Linking Programmer Analyst Skills to Industry Needs: A Current Review |
Peslak, Kovalchick, Kovacs, Conforti, Wang, Bhatnagar
|
2017 | View | Attitudes Toward Course Delivery: A Multi-University Study of Online, On-ground, And Hybrid Instruction |
Kovacs, Peslak, Kovalchick, Wang
|
2016 | View | Review of Masters in Business Analytics Curriculum |
Ceccucci, Kruck, Peslak, Sendall, Hunsinger, Hill
|
2015 | View | A Longitudinal Study of CIS Students, Course Performance and MBTI Personality Types |
Sendall, Peslak, Ceccucci, Kruck
|
2024 | View | Leveraging Dual Digital Twins for Advanced Cybersecurity Measures |
Peterson
|
2020 | View | On Using the Work Systems Method in Teaching Systems Analysis and Design |
Petkov
|
2020 | View | Practicing Evidence Based Teaching in Online Systems Analysis and Design and IT Project Management courses
|
Petkov, Petkova
|
2018 | View | An experiment on the impact of critical thinking instruction on the understanding of IS implementation problems |
Petkov, Petkova
|
2017 | View | Information Systems Strategy capstone course dedicated to storage technology |
Petkov
|
2015 | View | On the Development of Assessments of Student Learning in an Introductiory Information Management Course, |
Petkov, Citurs, Grandhi, Kunene
|
2020 | View | Practicing Evidence Based Teaching in Online Systems Analysis and Design and IT Project Management courses
|
Petkov, Petkova
|
2018 | View | An experiment on the impact of critical thinking instruction on the understanding of IS implementation problems |
Petkov, Petkova
|
2016 | View | Towards Improved Student Experiences in Service Learning in Information Systems Courses
|
Petkova
|
2015 | View | Service Learning through Community Engagement in Information Systems Courses |
Petkova, Lawler, Podeschi
|
2017 | View | Mind the LMS Content Producer – Blackboard usability for productivity and user satisfaction considerations |
Kunene, Petrides
|
2017 | View | Building Excel Expertise: A Guide in Best Practices |
Tastle, Mead, Rebman Jr., Marks, Phillips
|
2021 | View | AI Deep Learning With TensorFlow And Keras In Google Cloud Platform |
Nguyen, Philpot
|
2015 | View | Strategies and Approaches for Teaching Storage and Data Management – Faculty Perspectives, Insights & Suggestions |
Conway, Kline, Pickard, Royster, Woods, Zullo
|
2022 | View | A Case Study in Identifying and Measuring Skills Honed from a Cybersecurity Competition |
Pike, Duong, Weddle, Brown
|
2020 | View | Exploring Depth in Cybersecurity Education Through the Lens of a SIEM |
MacDonald, Pike, Pike
|
2020 | View | Exploring Depth in Cybersecurity Education Through the Lens of a SIEM |
MacDonald, Pike, Pike
|
2019 | View | Digital Badges and E-Portfolios in Cybersecurity Education |
Pike, West, Zentner, Brown, Stubblefield
|
2018 | View | From the Campus to the Conference "A Case Study in the Design and Development of Cyber Contests for Professional Conferences" |
Brown, Pike
|
2018 | View | IT Infrastructure Strategy in an Undergraduate Course |
Pike, Brown
|
2016 | View | Cloud-based Versus Local-based Web Development |
Pike, Pittman, Hwang
|
2016 | View | Role-Playing and Problem-Based Learning: |
Pike, Spangler, Williams, Kollar
|
2015 | View | An Observational Study of Peer Learning for High School Students at a Cybersecurity Camp |
Pittman, Pike
|
2015 | View | The Development of an Educational Cloud for IS Curriculum through a Student-Run Data Center |
Hwang, Pike, Manson
|
2024 | View | Detecting AI-Generated Writing Using GPTZero |
Paullet, Pinchot, Kinney, Stewart
|
2023 | View | Mobile Technology Has Changed Our Culture |
Paullet, Pinchot
|
2021 | View | The Impact of Choice Theory on Student Outcomes in Online Courses |
Paullet, Pinchot
|
2020 | View | Using Student Choice in Assignments to Create a Learner-Centered Environment for Online Courses |
Pinchot, Paullet
|
2019 | View | Student Perceptions of Challenges and Role of Mentorship in Cybersecurity Careers: Addressing the Gender Gap |
Pinchot, Cellante, Mishra, Paullet
|
2017 | View | Revisiting an Introductory Computer Information Systems Course: An Update to Course Topics and Incorporation of Project-Based Learning |
Cellante, Pinchot
|
2016 | View | Mobile Forensics and Security Certificate: An Addition to a Cyber Security Degree |
Paullet, Pinchot, Mishra
|
2015 | View | Assessing Faculty Perceptions and Techniques to Combat Academic Dishonesty in Online Courses |
Paullet, Chawdhry, Douglas, Pinchot
|
2020 | View | Mobile Technology in Higher Education:: an Extended Technology Acceptance Perspective
|
Pires, Halawi
|
2024 | View | An Analysis of Methodologies for the Prevention and Mitigation of Cheating in Online Gaming Using Artificial Intelligence and its Ethical Impact |
Pisano, Flynn, Tischer, Mandujano
|
2023 | View | Enhancing Business Education Through Exploratory Teaching of Generative AI |
Pisano
|
2022 | View | Bridging The Gap In Artificial Intelligence Education For Undergraduate Business Students |
Pisano
|
2021 | View | Technology Program Enrollments At Schools of Business And How To Help Meet The Labor Demand For Professionals |
Pisano, Toskin
|
2016 | View | Cloud-based Versus Local-based Web Development |
Pike, Pittman, Hwang
|
2015 | View | An Observational Study of Peer Learning for High School Students at a Cybersecurity Camp |
Pittman, Pike
|
2021 | View | Against “Flexibility”: Tightening the Cage of Academic Rigor with Instructors’ Responsibility and Rationality |
Li, Xiong, Pitts, Hunsinger
|
2018 | View | Using Active Learning and Agile Platform Development to Transform Introductory MIS Courses |
Sylvester, Ploskonka , Tedmon, Wilhelm
|
2015 | View | A Topic Analysis of ISECON Conference Proceedings from 1982 through 2014 |
Clark, Athey, Plotnicki, Barnes
|
2021 | View | Antecedents of Computer-based Testing (CBT) Anxiety and Performance |
Lewis, Mahatanankoon, Plumadore
|
2024 | View | Further Exploration Into the Uses of Microsoft Excel® in the Business Curriculum |
Podeschi, Trimble
|
2023 | View | ISCAP First Timers Info Meeting |
Connolly, Korzaan, Podeschi
|
2023 | View | The Evolution of an IT Student-Run Venture: A Follow-up Study |
Podeschi
|
2022 | View | Exploring the Uses of Microsoft Excel® in the Business Curriculum |
Trimble, Podeschi
|
2022 | View | First Timers Session |
Korzaan, Podeschi
|
2022 | View | IS2020 Model Curriculum: Understanding the Curricular Gaps for ACBSP Accredited Programs |
Podeschi, Reynolds, Voss
|
2021 | View | Integrating AWS Cloud Practitioner Certification into a Systems Administration Course |
Podeschi, DeBo
|
2021 | View | Not Just Another List: Increasing Student Engagement Using Innovative Apps |
Louch, Goldstein, Podeschi, Korzaan
|
2020 | View | Using Oracle Application Express Cloud during COVID-19 Remote Learning |
Podeschi
|
2019 | View | Lessons Learned from Launching and Advising a Student-run Technology Consulting Venture |
Podeschi
|
2018 | View | Building and Launching a Student-run I.T. Consulting Venture |
Podeschi
|
2018 | View | Integrating Big Data Analytics into an Undergraduate Information Systems Program using Hadoop |
Podeschi, DeBo
|
2017 | View | Low-cost Cluster Computing
Using Raspberry Pi with Mathematica |
Jacobus, Podeschi
|
2016 | View | Designing Effective Excel Training Courses for Organizations using the Corporate University Model |
Podeschi
|
2015 | View | Building I.S. Professionals through a Real-World Client Project in a Database Application Development Course |
Podeschi
|
2015 | View | Service Learning through Community Engagement in Information Systems Courses |
Petkova, Lawler, Podeschi
|
2020 | View | Promoting Positive Student Outcomes: The Use of Reflection and Planning Activities with a Growth-Mindset Focus and SMART Goals |
Poe, Brooks, Korzaan, Hulshult, Woods
|
2019 | View | Implementing Agile as an Instructional Methodology for Low-Code Software Development Courses |
Poe, Mew
|
2024 | View | Preparing Posthumanist Perspectives on AI-Human Collaboration in Developing Cyber Ethics Curricula |
Straight, Lowery, Poehlman, Yowika
|
2023 | View | Resilience During Times of Disruption: The Role of Data Analytics in a Healthcare System |
Pohana, Ariyachandra
|
2022 | View | Using LinkedIn Learning as a Component of Blended Learning in Two Separate Analytics Courses—Early Results |
Pomykalski
|
2020 | View | EDSIG / ISCAP Town Hall |
Babb, Pomykalski, Breimer, Lester, Serapiglia
|
2020 | View | Moving to Business Analytics: Re-Designing a Traditional Systems Analysis and Design Course |
Pomykalski
|
2018 | View | Transitioning a Systems Design and Analytics Course for Analytics Project Work: Topic and Pedagogical Considerations |
Pomykalski
|
2016 | View | Discovering Privacy--or the Lack Thereof |
Pomykalski
|
2015 | View | Using Current Events to Enhance Information Systems Pedagogy |
Pomykalski
|
2024 | View | A UTAUT-based analysis of the Adoption Factors of Student Evaluations of Teaching |
Caporusso, Doan, Acharya, Pandit, Shrestha, Le, Khatri, Pond
|
2024 | View | From Angry Reviews to Classroom Success: Using LLMs to Synthesize RateMyProfessors.com Data |
Caporusso, Doan, Acharya, Pandit, Shrestha, Khatri, Pond, Le
|
2023 | View | Experience on Teaching a Multi-Campus Systems Analysis and Design Unit Involving On-Campus and Off-Campus Students |
Poon, Tang
|
2023 | View | The Status Quo of Australia's FinTech Education and Training |
Poon, Wibowo, Grandhi, Tang
|
2020 | View | The Impact of Industrial Placement on BIS Graduate Employment and Further Educational Advancement |
Poon, Lau, Tang
|
2023 | View | Applications Of Multidimensional Scaling With Co-plot Analysis
|
Poosapati, Gebauer, Shi, Song
|
2019 | View | Next-Level Auto-grading in MIS Courses |
Savino, Pope
|
2021 | View | A Framework for the Sudden Switch to Remote and Online Teaching |
Popovich, Pangborn
|
2017 | View | The Impact of Teaching Approaches and Ordering on IT Project Management: Active Learning vs. Lecturing |
Sibona, Pourreza
|
2024 | View | The Growing Importance of Data Governance in an Interdisciplinary Research Methods Course with National and International Students |
Powell, Hendon
|
2023 | View | Data Analytics Position Description Analysis: Skills Review and Implications for Data Analytics Curricula |
Booker, Rebman Jr., Wimmer, Levkoff, Powell, Breese
|
2022 | View | An Industry Survey of Analytics Spreadsheet Tools Adoption: Microsoft Excel vs Google Sheets |
Rebman Jr., Wimmer, Booker, Levkoff, McMurtrey, Powell
|
2020 | View | Pandemic Shift: Impact of COVID-19 on IS/Microsoft Office Specialist Excel Certification Exam Classes: Remote Testing and Lessons Learned |
Rebman Jr., White, Booker, Wimmer, Powell
|
2018 | View | A Sampling of IT Service Learning Activities: Possible Impact on Students and Community Partners |
Powell, Wimmer
|
2017 | View | The Need for an Emotional Intelligence Course Designed for an Information Technology Curriculum: Framework for Educators and Academic Institutions |
Powell, Hendon, Wimmer
|
2016 | View | Parental Perceptions and Recommendations of Computing Majors: A Technology Acceptance Model Approach |
Powell, Wimmer
|
2015 | View | Evaluating the Effectiveness of Student Group Work for Mobile Application Development Learning, Productivity, Enjoyment and Confidence in Quality |
Powell, Wimmer
|
2024 | View | Improving Healthcare Through the Use of Volunteerism: A Database Design and Development Case |
Smatt, Pratt
|
2021 | View | Gold Rush Antiques: A Database Management Case |
Pratt, Smatt
|
2016 | View | Tourism through Travel Club: A Database Project |
Pratt, Smatt, Wynn, Jr.
|
2023 | View | Digital Transformation in Information Systems Curricula: A Keyword Analysis |
Hwang, Shi, Preiser-Houy
|
2024 | View | Online Maps and Route-Finding – Lots of Ways to Fail, Yet Still a Great Success!
|
Witman, Prior, Nickl, Njunge, Ngetich, Chaudhry
|
2024 | View | Our Interconnected, Resilient, Modern World ... Is Still Painfully and Remarkably Vulnerable |
Witman, Mackelprang, Prior
|
2023 | View | Developing a Data Analytics Practicum Course |
Bhatnagar, Pry, Causer, Lucci, Zilic
|
2019 | View | Student attitudes, awareness, and perceptions of personal privacy and cybersecurity in the use of social media: An initial study |
Bhatnagar, Pry
|